ID

VAR-200707-0675


CVE

CVE-2008-1447


TITLE

Multiple DNS implementations vulnerable to cache poisoning

Trust: 0.8

sources: CERT/CC: VU#800113

DESCRIPTION

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug.". ISC (Internet Systems Consortiuim) BIND generates cryptographically weak DNS query IDs which could allow a remote attacker to poison DNS caches. Deficiencies in the DNS protocol and common DNS implementations facilitate DNS cache poisoning attacks. Multiple vendors' implementations of the DNS protocol are prone to a DNS-spoofing vulnerability because the software fails to securely implement random values when performing DNS queries. Successfully exploiting this issue allows remote attackers to spoof DNS replies, allowing them to redirect network traffic and to launch man-in-the-middle attacks. This issue affects Microsoft Windows DNS Clients and Servers, ISC BIND 8 and 9, and multiple Cisco IOS releases; other DNS implementations may also be vulnerable. =========================================================== Ubuntu Security Notice USN-627-1 July 22, 2008 dnsmasq vulnerability CVE-2008-1447 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 8.04 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 8.04 LTS: dnsmasq-base 2.41-2ubuntu2.1 After a standard system upgrade you need to restart Dnsmasq to effect the necessary changes. Details follow: Dan Kaminsky discovered weaknesses in the DNS protocol as implemented by Dnsmasq. The first issue can be exploited by enticing pdnsd to send a query to a malicious DNS server, or using the port randomization weakness, and might lead to a Denial of Service. Workaround ========== Port randomization can be enabled by setting the "query_port_start" option to 1024 which would resolve the CVE-2008-1447 issue. Among other things, successful attacks can lead to misdirected web traffic and email rerouting. This update changes Debian's dnsmasq packages to implement the recommended countermeasure: UDP query source port randomization. This change increases the size of the space from which an attacker has to guess values in a backwards-compatible fashion and makes successful attacks significantly more difficult. This update also switches the random number generator to Dan Bernstein's SURF. For the stable distribution (etch), this problem has been fixed in version 2.35-1+etch4. Packages for alpha will be provided later. For the unstable distribution (sid), this problem has been fixed in version 2.43-1. We recommend that you upgrade your dnsmasq package. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 4.0 alias etch - ------------------------------- Stable updates are available for amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4.dsc Size/MD5 checksum: 596 3834461c89e55467b4b65ed4ac209e81 http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35.orig.tar.gz Size/MD5 checksum: 252901 ad1fafeaf3442685cfe16613e0f8b777 http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4.diff.gz Size/MD5 checksum: 19202 4ced7768f49198bd43bbbd24f2a3d3e4 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_amd64.deb Size/MD5 checksum: 188278 8fb55f694db9fdfccaa86d134e937777 arm architecture (ARM) http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_arm.deb Size/MD5 checksum: 181746 4caf23f31de937b817e12ade7d132eac hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_hppa.deb Size/MD5 checksum: 190490 66730e785683655b058d11aa70346be4 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_i386.deb Size/MD5 checksum: 184546 1fbdd71e81a1e05d68b0f88eaeb00b10 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_ia64.deb Size/MD5 checksum: 223758 011f283b71ef0f9e07d5a9dce25db505 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_mips.deb Size/MD5 checksum: 189846 5c67cca2eaedc1dff80c5fd05aa1d33f mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_mipsel.deb Size/MD5 checksum: 191824 dfd87d69a7751f1e6ef2d0f1ede052ff powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_powerpc.deb Size/MD5 checksum: 186890 93701abcca5421beddab015a7f35af99 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_s390.deb Size/MD5 checksum: 186396 6f19f6c8d803c3d57e01e73fe1e11886 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_sparc.deb Size/MD5 checksum: 182910 f360078c14f715e90e60124b4ede2be9 These files will probably be moved into the stable distribution on its next update. In IP NAT filtering in Sun Solaris 10 and OpenSolaris series products, when a DNS server runs NAT, it incorrectly changes the original address of the data packet. And spoof the address returned by the DNS response. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200812-17 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Ruby: Multiple vulnerabilities Date: December 16, 2008 Bugs: #225465, #236060 ID: 200812-17 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been discovered in Ruby that allow for attacks including arbitrary code execution and Denial of Service. Background ========== Ruby is an interpreted object-oriented programming language. The elaborate standard library includes an HTTP server ("WEBRick") and a class for XML parsing ("REXML"). Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-lang/ruby < 1.8.6_p287-r1 >= 1.8.6_p287-r1 Description =========== Multiple vulnerabilities have been discovered in the Ruby interpreter and its standard libraries. Drew Yao of Apple Product Security discovered the following flaws: * Arbitrary code execution or Denial of Service (memory corruption) in the rb_str_buf_append() function (CVE-2008-2662). * Arbitrary code execution or Denial of Service (memory corruption) in the rb_ary_stor() function (CVE-2008-2663). * Memory corruption via alloca in the rb_str_format() function (CVE-2008-2664). * Memory corruption ("REALLOC_N") in the rb_ary_splice() and rb_ary_replace() functions (CVE-2008-2725). * Memory corruption ("beg + rlen") in the rb_ary_splice() and rb_ary_replace() functions (CVE-2008-2726). Furthermore, several other vulnerabilities have been reported: * Tanaka Akira reported an issue with resolv.rb that enables attackers to spoof DNS responses (CVE-2008-1447). * Akira Tagoh of RedHat discovered a Denial of Service (crash) issue in the rb_ary_fill() function in array.c (CVE-2008-2376). * Several safe level bypass vulnerabilities were discovered and reported by Keita Yamaguchi (CVE-2008-3655). * Christian Neukirchen is credited for discovering a Denial of Service (CPU consumption) attack in the WEBRick HTTP server (CVE-2008-3656). * A fault in the dl module allowed the circumvention of taintness checks which could possibly lead to insecure code execution was reported by "sheepman" (CVE-2008-3657). * Tanaka Akira again found a DNS spoofing vulnerability caused by the resolv.rb implementation using poor randomness (CVE-2008-3905). * Luka Treiber and Mitja Kolsek (ACROS Security) disclosed a Denial of Service (CPU consumption) vulnerability in the REXML module when dealing with recursive entity expansion (CVE-2008-3790). Impact ====== These vulnerabilities allow remote attackers to execute arbitrary code, spoof DNS responses, bypass Ruby's built-in security and taintness checks, and cause a Denial of Service via crash or CPU exhaustion. Workaround ========== There is no known workaround at this time. Resolution ========== All Ruby users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.6_p287-r1" References ========== [ 1 ] CVE-2008-1447 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447 [ 2 ] CVE-2008-2376 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2376 [ 3 ] CVE-2008-2662 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2662 [ 4 ] CVE-2008-2663 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2663 [ 5 ] CVE-2008-2664 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2664 [ 6 ] CVE-2008-2725 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2725 [ 7 ] CVE-2008-2726 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2726 [ 8 ] CVE-2008-3655 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3655 [ 9 ] CVE-2008-3656 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3656 [ 10 ] CVE-2008-3657 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3657 [ 11 ] CVE-2008-3790 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3790 [ 12 ] CVE-2008-3905 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3905 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200812-17.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. License ======= Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . * Carlos Carvalho reported that dnsmasq in the 2.43 version does not properly handle clients sending inform or renewal queries for unknown DHCP leases, leading to a crash (CVE-2008-3350). Furthermore, an attacker could generate invalid DHCP traffic and cause a Denial of Service. (These vulnerabilities were reported by Keita Yamaguchi.) == DoS vulnerability in WEBrick == An error exists in the usage of regular expressions in "WEBrick::HTTPUtils.split_header_value()". This can be exploited to consume large amounts of CPU via a specially crafted HTTP request. (This vulnerability was reported by Christian Neukirchen.) == Lack of taintness check in dl == An error in "DL" can be exploited to bypass security restrictions and call potentially dangerous functions. (This vulnerability was reported by Tanaka Akira.) Affected packages: Pardus 2008: ruby, all before 1.8.7_p72-16-4 ruby-mode, all before 1.8.7_p72-16-4 Pardus 2007: ruby, all before 1.8.7_p72-16-13 ruby-mode, all before 1.8.7_p72-16-4 Resolution ========== There are update(s) for ruby, ruby-mode. You can update them via Package Manager or with a single command from console: Pardus 2008: pisi up ruby ruby-mode Pardus 2007: pisi up ruby ruby-mode References ========== * http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447 * http://secunia.com/advisories/31430/ ------------------------------------------------------------------------ -- Pınar Yanardağ http://pinguar.org _______________________________________________ Full-Disclosure - We believe in it. Release Date: 2008-07-16 Last Updated: 2010-12-15 ----------------------------------------------------------------------------- Potential Security Impact: Remote DNS cache poisoning Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP-UX running BIND. References: CVE-2008-1447 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.11, B.11.23, B.11.31 running BIND v9.3.2 or BIND v9.2.0, HP-UX B.11.11 running BIND v8.1.2 BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2008-1447 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided the following software updates / patch to resolve the vulnerabilities for BIND v9.2.0 and BIND v9.3.2. Customers running BIND v8.1.2 on HP-UX B.11.11 should upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates listed below. A new BIND v9.2.0 depot is available to address an issue encountered on HP-UX B.11.11. The new depot is available by contacting HP Support. The BIND v9.3.2 updates are available for download from: http://software.hp.com The patch PHNE_37865 is available from: http://itrc.hp.com HP-UX Release / Action B.11.11 running v8.1.2 / Upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates listed below, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. HP-UX Release / BIND Depot name / Action B.11.11 running v9.2.0 / BIND920V15.depot / Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. HP-UX Release / Action B.11.23 running v9.2.0 / Install PHNE_37865 or subsequent; Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. HP-UX Release / Action B.11.11 running v9.3.2 / Install revision C.9.3.2.7.0 or subsequent; Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. B.11.23 running v9.3.2 / Install revision C.9.3.2.7.0 or subsequent; Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. B.11.31 running v9.3.2 / Install revision C.9.3.2.3.0 or subsequent; Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. Note: Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. Note: Firewall configurations may need to be adjusted to allow DNS queries from random source ports to pass. In addition, firewalls that forward DNS queries must not replace the random source ports. MANUAL ACTIONS: Yes - NonUpdate Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. Check firewall settings. For B.11.11 running v8.1.2, upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates For B.11.11 running v9.2.0 install BIND920v15.depot PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all HP-issued Security Bulletins and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa AFFECTED VERSIONS For BIND v8.1.2 HP-UX B.11.11 ============= InternetSrvcs.INETSVCS-RUN action: upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. For BIND v9.3.2 HP-UX B.11.11 ============= BindUpgrade.BIND-UPGRADE action: install revision C.9.3.2.7.0 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL: http://software.hp.com HP-UX B.11.23 ============= BindUpgrade.BIND-UPGRADE BindUpgrade.BIND2-UPGRADE action: install revision C.9.3.2.7.0 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL: http://software.hp.com HP-UX B.11.31 ============= NameService.BIND-AUX NameService.BIND-RUN action: install revision C.9.3.2.7.0 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL: http://software.hp.com For BIND v9.2.0 HP-UX B.11.11 ============= BINDv920.INETSVCS-BIND action: install revision B.11.11.01.015 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL Contact HP Support for information on where to download depot. HP-UX B.11.23 ============= InternetSrvcs.INETSVCS-INETD InternetSrvcs.INETSVCS-RUN InternetSrvcs.INETSVCS2-RUN action: install patch PHNE_37865 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL: http://itrc.hp.com END AFFECTED VERSIONS HISTORY Version:1 (rev.1) - 16 July 2008 Initial release Version:2 (rev.2) - 19 July 2008 Added BIND v9.2.0 depot information Version:3 (rev.3) - 06 August 2008 Updated patch location, revised BIND v9.2.0 depot information, added BIND v8.1.2 Version:4 (rev.4) - 08 August 2008 Updated manual actions to include named.conf and firewall configuration setings Version:5 (rev.5) - 12 October 2010 Updated version for BIND v9.2.0 depot for B.11.11 Version:6 (rev.6) - 15 December 2010 Reformat v9.2.0 recommendation for clarity. Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches -check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems -verify your operating system selections are checked and save. To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do * The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. At this time, it is not possible to implement the recommended countermeasures in the GNU libc stub resolver. The following workarounds are available: 1. Install a local BIND 9 resoler on the host, possibly in forward-only mode. (Other caching resolvers can be used instead.) 2. Rely on IP address spoofing protection if available. Successful attacks must spoof the address of one of the resolvers, which may not be possible if the network is guarded properly against IP spoofing attacks (both from internal and external sources). This DSA will be updated when patches for hardening the stub resolver are available. Dan Kaminsky identified a practical vector of DNS response spoofing and cache poisoning, exploiting the limited entropy in a DNS transaction ID and lack of UDP source port randomization in many DNS implementations. Scott Kitterman noted that python-dns is vulnerable to this predictability, as it randomizes neither its transaction ID nor its source port. Taken together, this lack of entropy leaves applications using python-dns to perform DNS queries highly susceptible to response forgery. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: Red Hat update for bind SECUNIA ADVISORY ID: SA26195 VERIFY ADVISORY: http://secunia.com/advisories/26195/ CRITICAL: Moderately critical IMPACT: Spoofing WHERE: >From remote OPERATING SYSTEM: Red Hat Enterprise Linux (v. 5 server) http://secunia.com/product/13652/ Red Hat Enterprise Linux Desktop (v. 5 client) http://secunia.com/product/13653/ Red Hat Enterprise Linux Desktop Workstation (v. 5 client) http://secunia.com/product/13651/ RedHat Enterprise Linux AS 2.1 http://secunia.com/product/48/ RedHat Enterprise Linux AS 3 http://secunia.com/product/2534/ RedHat Enterprise Linux AS 4 http://secunia.com/product/4669/ RedHat Enterprise Linux ES 2.1 http://secunia.com/product/1306/ RedHat Enterprise Linux ES 3 http://secunia.com/product/2535/ RedHat Enterprise Linux ES 4 http://secunia.com/product/4668/ RedHat Enterprise Linux WS 3 http://secunia.com/product/2536/ RedHat Enterprise Linux WS 2.1 http://secunia.com/product/1044/ RedHat Enterprise Linux WS 4 http://secunia.com/product/4670/ RedHat Linux Advanced Workstation 2.1 for Itanium http://secunia.com/product/1326/ DESCRIPTION: Red Hat has issued an update for bind. For more information: SA26152 SOLUTION: Updated packages are available from Red Hat Network. http://rhn.redhat.com ORIGINAL ADVISORY: http://rhn.redhat.com/errata/RHSA-2007-0740.html OTHER REFERENCES: SA26152: http://secunia.com/advisories/26152/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2008-0014 Synopsis: Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues. Issue date: 2008-08-29 Updated on: 2008-08-29 (initial release of advisory) CVE numbers: CVE-2008-2101 CVE-2007-5269 CVE-2008-1447 CVE-2008-3691 CVE-2008-3692 CVE-2008-3693 CVE-2008-3694 CVE-2008-3695 CVE-2007-5438 CVE-2008-3696 CVE-2008-3697 CVE-2008-3698 CVE-2008-1806 CVE-2008-1807 CVE-2008-1808 CVE-2007-5503 - -------------------------------------------------------------------------- 1. Summary Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues. 2. Relevant releases VMware Workstation 6.0.4 and earlier, VMware Workstation 5.5.7 and earlier, VMware Player 2.0.4 and earlier, VMware Player 1.0.7 and earlier, VMware ACE 2.0.4 and earlier, VMware ACE 1.0.6 and earlier, VMware Server 1.0.6 and earlier, VMware ESX 3.0.3 without patches ESX303-200808404-SG, ESX303-200808403-SG ESX303-200808406-SG. VMware ESX 3.0.2 without patches ESX-1005109, ESX-1005113, ESX-1005114. VMware ESX 3.0.1 without patches ESX-1005108, ESX-1005112, ESX-1005111, ESX-1004823, ESX-1005117. NOTE: Hosted products VMware Workstation 5.x, VMware Player 1.x, and VMware ACE 1.x will reach end of general support 2008-11-09. Customers should plan to upgrade to the latest version of their respective products. Extended support (Security and Bug fixes) for ESX 3.0.2 ends on 10/29/2008 and Extended support for ESX 3.0.2 Update 1 ends on 8/8/2009. Users should plan to upgrade to ESX 3.0.3 and preferably to the newest release available. Extended Support (Security and Bug fixes) for ESX 3.0.1 has ended on 2008-07-31. The 3.0.1 patches are released in August because there was no patch release in July. 3. Problem Description I Security Issues a. Setting ActiveX killbit Starting from this release, VMware has set the killbit on its ActiveX controls. Setting the killbit ensures that ActiveX controls cannot run in Internet Explorer (IE), and avoids security issues involving ActiveX controls in IE. See the Microsoft KB article 240797 and the related references on this topic. Security vulnerabilities have been reported for ActiveX controls provided by VMware when run in IE. Under specific circumstances, exploitation of these ActiveX controls might result in denial-of- service or can allow running of arbitrary code when the user browses a malicious Web site or opens a malicious file in IE browser. An attempt to run unsafe ActiveX controls in IE might result in pop-up windows warning the user. Note: IE can be configured to run unsafe ActiveX controls without prompting. VMware recommends that you retain the default settings in IE, which prompts when unsafe actions are requested. Earlier, VMware had issued knowledge base articles, KB 5965318 and KB 9078920 on security issues with ActiveX controls. To avoid malicious scripts that exploit ActiveX controls, do not enable unsafe ActiveX objects in your browser settings. As a best practice, do not browse untrusted Web sites as an administrator and do not click OK or Yes if prompted by IE to allow certain actions. VMware would like to thank Julien Bachmann, Shennan Wang, Shinnai, and Michal Bucko for reporting these issues to us. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the names CVE-2008-3691, CVE-2008-3692, CVE-2008-3693, CVE-2008-3694, CVE-2008-3695, CVE-2007-5438, and CVE-2008-3696 to the security issues with VMware ActiveX controls. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not affected Workstation 6.x Windows 6.0.5 build 109488 or later Workstation 6.x Linux not affected Workstation 5.x Windows 5.5.8 build 108000 or later Workstation 5.x Linux not affected Player 2.x Windows 2.0.5 build 109488 or later Player 2.x Linux not affected Player 1.x Windows 1.0.8 build or later Player 1.x Linux not affected ACE 2.x Windows 2.0.5 build 109488 or later ACE 1.x Windows 1.0.7 build 108880 or later Server 1.x Windows 1.0.7 build 108231 or later Server 1.x Linux not affected Fusion 1.x Mac OS/X not affected ESXi 3.5 ESXi not affected ESX any ESX not affected b. VMware ISAPI Extension Denial of Service The Internet Server Application Programming Interface (ISAPI) is an API that extends the functionality of Internet Information Server (IIS). VMware uses ISAPI extensions in its Server product. One of the ISAPI extensions provided by VMware is vulnerable to a remote denial of service. By sending a malformed request, IIS might shut down. IIS 6.0 restarts automatically. However, IIS 5.0 does not restart automatically when its Startup Type is set to Manual. VMware would like to thank the Juniper Networks J-Security Security Research Team for reporting this issue to us. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2008-3697 to this issue. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not affected Workstation 6.x Windows not affected Workstation 6.x Linux not affected Workstation 5.x Windows not affected Workstation 5.x Linux not affected Player 2.x Windows not affected Player 2.x Linux not affected Player 1.x Windows not affected Player 1.x Linux not affected ACE 2.x Windows not affected ACE 1.x Windows not affected Server 1.x Windows 1.0.7 build 108231 or later Server 1.x Linux not affected Fusion 1.x Mac OS/X not affected ESXi 3.5 ESXi not affected ESX any ESX not affected c. OpenProcess Local Privilege Escalation on Host System This release fixes a privilege escalation vulnerability in host systems. Exploitation of this vulnerability allows users to run arbitrary code on the host system with elevated privileges. VMware would like to thank Sun Bing from McAfee, Inc. for reporting this issue to us. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2008-3698 to this issue. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not affected Workstation 6.x Windows not affected Workstation 6.x Linux not affected Workstation 5.x Windows 5.5.8 build 108000 or later Workstation 5.x Linux not affected Player 2.x Windows not affected Player 2.x Linux not affected Player 1.x Windows 1.0.8 build 109488 or later Player 1.x Linux not affected ACE 2.x Windows not affected ACE 1.x Windows 1.0.7 build 108880 or later Server 1.x Windows 1.0.7 build 108231 or later Server 1.x Linux not affected Fusion 1.x Mac OS/X not affected ESXi 3.5 ESXi not affected ESX any ESX not affected d. Update to Freetype FreeType 2.3.6 resolves an integer overflow vulnerability and other vulnerabilities that can allow malicious users to run arbitrary code or might cause a denial-of-service after reading a maliciously crafted file. This release updates FreeType to 2.3.7. The Common Vulnerabilities and Exposures Project (cve.mitre.com) has assigned the names CVE-2008-1806, CVE-2008-1807, and CVE-2008-1808 to the issues resolved in Freetype 2.3.6. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not affected Workstation 6.x Windows not affected Workstation 6.x Linux 6.0.5 build 109488 or later Workstation 5.x Windows not affected Workstation 5.x Linux 5.5.8 build 108000 or later Player 2.x Windows not affected Player 2.x Linux 2.0.5 build 109488 or later Player 1.x Windows not affected Player 1.x Linux 1.0.8 build 108000 or later ACE 2.x Windows not affected ACE 1.x Windows not affected Server 1.x Windows not affected Server 1.x Linux 1.0.7 build 108231 or later Fusion 1.x Mac OS/X affected, patch pending ESXi 3.5 ESXi not affected ESX 3.5 ESX not affected ESX 3.0.3 ESX not affected ESX 3.0.2 ESX not affected ESX 3.0.1 ESX not affected ESX 2.5.5 ESX affected, patch pending ESX 2.5.4 ESX affected, patch pending e. Update to Cairo Cairo 1.4.12 resolves an integer overflow vulnerability that can allow malicious users to run arbitrary code or might cause a denial-of-service after reading a maliciously crafted PNG file. This release updates Cairo to 1.4.14. The Common Vulnerabilities and Exposures (cve.mitre.com) has assigned the name CVE-2007-5503 to this issue. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not affected Workstation 6.x Windows not affected Workstation 6.x Linux 6.0.5 build 109488 or later Workstation 5.x Windows not affected Workstation 5.x Linux not affected Player 2.x Windows not affected Player 2.x Linux 2.0.5 build 109488 or later Player 1.x Windows not affected Player 1.x Linux not affected ACE 2.x Windows not affected ACE 1.x Windows not affected Server 1.x Windows not affected Server 1.x Linux not affected Fusion 1.x Mac OS/X affected, patch pending ESXi 3.5 ESXi not affected ESX any ESX not affected f. VMware Consolidated Backup(VCB) command-line utilities may expose sensitive information VMware Consolidated Backup command-line utilities accept the user password through the -p command-line option. Users logged into the service console could gain access to the username and password used by VCB command-line utilities when such commands are running. This patch resolves this issue by providing an alternative way of passing the password used by VCB command-line utilities. The following options are recommended for passing the password: 1. The password is specified in /etc/backuptools.conf (PASSWORD=xxxxx), and -p is not used in the command line. /etc/backuptools.conf file permissions are read/write only for root. 2. No password is specified in /etc/backuptools.conf and the -p option is not used in the command line. The user will be prompted to enter a password. ESX is not affected unless you use VCB. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2008-2101 to this issue. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= =================== VirtualCenter any Windows not affected hosted * any any not affected ESXi 3.5 ESXi not affected ESX 3.5 ESX ESX350-200806203-UG ESX 3.0.3 ESX ESX303-200808403-SG ESX 3.0.2 ESX ESX-1004824 ESX 3.0.1 ESX ESX-1004823 ESX 2.5.5 ESX not affected ESX 2.5.4 ESX not affected * hosted products are VMware Workstation, Player, ACE, Server, Fusion g. Third Party Library libpng Updated to 1.2.29 Several flaws were discovered in the way third party library libpng handled various PNG image chunks. An attacker could create a carefully crafted PNG image file in such a way that it causes an application linked with libpng to crash when the file is manipulated. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2007-5269 to this issue. NOTE: There are multiple patches required to remediate the issue. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= =================== VirtualCenter any Windows not affected hosted * any any not affected ESXi 3.5 ESXi affected, patch pending ESX 3.5 ESX affected, patch pending ESX 3.0.3 ESX ESX303-200808404-SG ESX303-200808403-SG ESX 3.0.2 ESX ESX-1005109 ESX-1005114 ESX-1005113 ESX 3.0.1 ESX ESX-1005112 ESX-1005108 ESX-1005111 ESX 2.5.5 ESX affected, patch pending ESX 2.5.4 ESX affected, patch pending * hosted products are VMware Workstation, Player, ACE, Server, Fusion II ESX Service Console rpm updates a. update to bind This update upgrades the service console rpms for bind-utils and bind-lib to version 9.2.4-22.el3. Version 9.2.4.-22.el3 addresses the recently discovered vulnerability in the BIND software used for Domain Name resolution (DNS). VMware doesn't install all the BIND packages on ESX Server and is not vulnerable by default to the reported vulnerability. Of the BIND packages, VMware only ships bind-util and bind-lib in the service console and these components by themselves cannot be used to setup a DNS server. Bind-lib and bind-util are used in client DNS applications like nsupdate, nslookup, etc. VMware explicitly discourages installing applications like BIND on the service console. In case the customer has installed BIND, and the DNS server is configured to support recursive queries, their ESX Server system is affected and they should replace BIND with a patched version. Note: ESX Server will use the DNS server on the network it is on, so it is important to patch that DNS server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2008-1447 to this issue. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= =================== VirtualCenter any Windows not affected hosted * any any not affected ESXi 3.5 ESXi not affected ESX 3.5 ESX patch pending ESX 3.0.3 ESX ESX303-200808406-SG ESX 3.0.2 ESX ESX-1006356 ESX 3.0.1 ESX ESX-1005117 ESX 2.5.5 ESX patch pending ESX 2.5.4 ESX patch pending * hosted products are VMware Workstation, Player, ACE, Server, Fusion 4. Solution Please review the patch/release notes for your product and version and verify the md5sum of your downloaded file. VMware Workstation 6.0.5 ------------------------ http://www.vmware.com/download/ws/ Release notes: http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html Windows binary md5sum: 46b4c54f0493f59f52ac6c2965296859 RPM Installation file for 32-bit Linux md5sum: 49ebfbd05d146ecc43262622ab746f03 tar Installation file for 32-bit Linux md5sum: 14ac93bffeee72528629d4caecc5ef37 RPM Installation file for 64-bit Linux md5sum: 0a856f1a1a31ba3c4b08bcf85d97ccf6 tar Installation file for 64-bit Linux md5sum: 3b459254069d663e9873a661bc97cf6c VMware Workstation 5.5.8 ------------------------ http://www.vmware.com/download/ws/ws5.html Release notes: http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html Windows binary: md5sum: 745c3250e5254eaf6e65fcfc4172070f Compressed Tar archive for 32-bit Linux md5sum: 65a454749d15d4863401619d7ff5566e Linux RPM version for 32-bit Linux md5sum: d80adc73b1500bdb0cb24d1b0733bcff VMware Player 2.0.5 and 1.0.8 ----------------------------- http://www.vmware.com/download/player/ Release notes Player 1.x: http://www.vmware.com/support/player/doc/releasenotes_player.html Release notes Player 2.0 http://www.vmware.com/support/player2/doc/releasenotes_player2.html 2.0.5 Windows binary md5sum: 60265438047259b23ff82fdfe737f969 VMware Player 2.0.5 for Linux (.rpm) md5sum: 3bc81e203e947e6ca5b55b3f33443d34 VMware Player 2.0.5 for Linux (.tar) md5sum: f499603d790edc5aa355e45b9c5eae01 VMware Player 2.0.5 - 64-bit (.rpm) md5sum: 85bc2f11d06c362feeff1a64ee5a6834 VMware Player 2.0.5 - 64-bit (.tar) md5sum: b74460bb961e88817884c7e2c0f30215 1.0.8 Windows binary md5sum: e5f927304925297a7d869f74b7b9b053 Player 1.0.8 for Linux (.rpm) md5sum: a13fdb8d72b661cefd24e7dcf6e2a990 Player 1.0.8 for Linux (.tar) md5sum: 99fbe861253eec5308d8c47938e8ad1e VMware ACE 2.0.5 ---------------- http://www.vmware.com/download/ace/ Release notes 2.0: http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html ACE Manager Server Virtual Appliance Virtual Appliance for the ACE Management Server md5sum: 41e7349f3b6568dffa23055bb629208d ACE for Window 32-bit and 64-bit Main installation file for Windows 32-bit and 64-bit host (ACE Option Page key required for enabling ACE authoring) md5sum:46b4c54f0493f59f52ac6c2965296859 ACE Management Server for Windows ACE Management Server installation file for Windows md5sum:33a015c4b236329bcb7e12c82271c417 ACE Management Server for Red Hat Enterprise Linux 4 ACE Management Server installation file for Red Hat Enterprise Linux 4 md5sum:dc3bd89fd2285f41ed42f8b28cd5535f ACE Management Server for SUSE Enterprise Linux 9 ACE Management Server installation file for SUSE Enterprise Linux 9 md5sum:2add6a4fc97e1400fb2f94274ce0dce0 VMware ACE 1.0.7 ---------------- http://www.vmware.com/download/ace/ Release notes: http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html md5sum: 42d806cddb8e9f905722aeac19740f33 VMware Server 1.0.7 ------------------- http://www.vmware.com/download/server/ Release notes: http://www.vmware.com/support/server/doc/releasenotes_server.html VMware Server for Windows 32-bit and 64-bit md5sum: 2e2ee5ebe08ae48eac5e661cad01acf6 VMware Server Windows client package md5sum: ce7d906a5a8de37cbc20db4332de1adb VMware Server for Linux md5sum: 04f201122b16222cd58fc81ca814ff8c VMware Server for Linux rpm md5sum: 6bae706df040c35851823bc087597d8d Management Interface md5sum: e67489bd2f23bcd4a323d19df4e903e8 VMware Server Linux client package md5sum: 99f1107302111ffd3f766194a33d492b ESX --- ESX 3.5.0 patch ESX350-200806203-UG (VCB) http://download3.vmware.com/software/esx/ESX350-200806203-UG.zip md5sum: 3bd512dc8aa2b276f7cfd19080d193c9 http://kb.vmware.com/kb/1005896 ESX 3.0.3 patch ESX303-200808403-SG (libpng) http://download3.vmware.com/software/vi/ESX303-200808403-SG.zip md5sum: 5f1e75631e53c0e9e013acdbe657cfc7 http://kb.vmware.com/kb/1006034 ESX 3.0.3 patch ESX303-200808404-SG (libpng) http://download3.vmware.com/software/vi/ESX303-200808404-SG.zip md5sum: 65468a5b6ba105cfde1dd444d77b2df4 http://kb.vmware.com/kb/1006035 ESX 3.0.3 patch ESX303-200808406-SG (bind) http://download3.vmware.com/software/vi/ESX303-200808406-SG.zip md5sum: a11273e8d430e5784071caff673995f4 http://kb.vmware.com/kb/1006357 ESX 3.0.3 patch (VCB) ESX 3.0.2 patch ESX-1005109 (libpng) http://download3.vmware.com/software/vi/ESX-1005109.tgz md5sum: 456d74d94317f852024aed5d3852be09 http://kb.vmware.com/kb/1005109 ESX 3.0.2 patch ESX-1005113 (libpng) http://download3.vmware.com/software/vi/ESX-1005113.tgz md5sum: 5d604f2bfd90585b9c8679f5fc8c31b7 http://kb.vmware.com/kb/1005113 ESX 3.0.2 patch ESX-1005114 (libpng) http://download3.vmware.com/software/vi/ESX-1005114.tgz md5sum: 3b6d33b334f0020131580fdd8f9b5365 http://kb.vmware.com/kb/1005114 ESX 3.0.2 patch ESX-1004824 (VCB) http://download3.vmware.com/software/vi/ESX-1004824.tgz md5sum: c72b0132c9f5d7b4cb1b9e47748a9c5b http://kb.vmware.com/kb/1004824 ESX 3.0.2 patch ESX-1006356 (bind) http://download3.vmware.com/software/vi/ESX-1006356.tgz md5sum: f0bc9d0b641954145df3986cdb1c2bab http://kb.vmware.com/kb/1006356 ESX 3.0.1 patch ESX-1005111 (libpng) http://download3.vmware.com/software/vi/ESX-1005111.tgz md5sum: 60e1be9b41070b3531c06f9a0595e24c http://kb.vmware.com/kb/1005111 ESX 3.0.1 patch ESX-1005112 (libpng) http://download3.vmware.com/software/vi/ESX-1005112.tgz md5sum: ad645cef0f9fa18bb648ba5a37074732 http://kb.vmware.com/kb/1005112 ESX 3.0.1 patch ESX-1005108 (libpng) http://download3.vmware.com/software/vi/ESX-1005108.tgz md5sum: aabc873d978f023c929ccd9a54588ea5 http://kb.vmware.com/kb/1005108 ESX 3.0.1 patch ESX-1004823 (VCB) http://download3.vmware.com/software/vi/ESX-1004823.tgz md5sum: 5ff2e8ce50c18afca76fb16c28415a59 http://kb.vmware.com/kb/1004823 ESX 3.0.1 patch ESX-1005117 (bind) http://download3.vmware.com/software/vi/ESX-1005117.tgz md5sum: 5271ecc6e36fb6f1fdf372e57891aa33 http://kb.vmware.com/kb/1005117 5. References CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2101 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3691 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3692 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3693 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3694 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3695 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5438 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3696 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3697 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3698 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5503 - ------------------------------------------------------------------------ 6. Change log 2008-08-29 VMSA-2008-0014 initial release - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: * security-announce at lists.vmware.com * bugtraq at securityfocus.com * full-disclosure at lists.grok.org.uk E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Center http://www.vmware.com/security VMware security response policy http://www.vmware.com/support/policies/security_response.html General support life cycle policy http://www.vmware.com/support/policies/eos.html VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html Copyright 2008 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux) iD8DBQFIuI98S2KysvBH1xkRCJp7AJ9Mq0+CEdoQRLzPLSRbv5OLqXqUHACfUSRt bZpHL8qHcNwAiTVz6P3+W6E= =PQ58 -----END PGP SIGNATURE-----

Trust: 3.96

sources: NVD: CVE-2008-1447 // CERT/CC: VU#252735 // CERT/CC: VU#800113 // BID: 30131 // VULMON: CVE-2008-1447 // PACKETSTORM: 68412 // PACKETSTORM: 73732 // PACKETSTORM: 68288 // PACKETSTORM: 68691 // VULHUB: VHN-31572 // PACKETSTORM: 68360 // PACKETSTORM: 73060 // PACKETSTORM: 69643 // PACKETSTORM: 69021 // PACKETSTORM: 96747 // PACKETSTORM: 68038 // PACKETSTORM: 68546 // PACKETSTORM: 58035 // PACKETSTORM: 69536

AFFECTED PRODUCTS

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 1.6

vendor:fujitsumodel: - scope: - version: -

Trust: 1.6

vendor:internet consortiummodel: - scope: - version: -

Trust: 1.6

vendor:openwall gnu linuxmodel: - scope: - version: -

Trust: 1.6

vendor:red hatmodel: - scope: - version: -

Trust: 1.6

vendor:suse linuxmodel: - scope: - version: -

Trust: 1.6

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 1.6

vendor:ubuntumodel: - scope: - version: -

Trust: 1.6

vendor:iscmodel:bindscope:eqversion:8

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:4

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.2.9

Trust: 1.0

vendor:ciscomodel:ios 12.4scope:neversion: -

Trust: 0.9

vendor:alcatel lucentmodel: - scope: - version: -

Trust: 0.8

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:avayamodel: - scope: - version: -

Trust: 0.8

vendor:blue coatmodel: - scope: - version: -

Trust: 0.8

vendor:bluecatmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:f5model: - scope: - version: -

Trust: 0.8

vendor:force10model: - scope: - version: -

Trust: 0.8

vendor:freebsdmodel: - scope: - version: -

Trust: 0.8

vendor:funkwerkmodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:infobloxmodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:mandrivamodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:necmodel: - scope: - version: -

Trust: 0.8

vendor:nixumodel: - scope: - version: -

Trust: 0.8

vendor:nominummodel: - scope: - version: -

Trust: 0.8

vendor:nortelmodel: - scope: - version: -

Trust: 0.8

vendor:novellmodel: - scope: - version: -

Trust: 0.8

vendor:openbsdmodel: - scope: - version: -

Trust: 0.8

vendor:qnxmodel: - scope: - version: -

Trust: 0.8

vendor:secure computing network security divisionmodel: - scope: - version: -

Trust: 0.8

vendor:slackware linuxmodel: - scope: - version: -

Trust: 0.8

vendor:wind rivermodel: - scope: - version: -

Trust: 0.8

vendor:yamahamodel: - scope: - version: -

Trust: 0.8

vendor:dnsmasqmodel: - scope: - version: -

Trust: 0.8

vendor:novellmodel:netware sp1.1scope:eqversion:6.5

Trust: 0.6

vendor:ciscomodel:application & content networking softwarescope: - version: -

Trust: 0.6

vendor:microsoftmodel:windows xp home sp1scope: - version: -

Trust: 0.3

vendor:yukihiromodel:matsumoto rubyscope:eqversion:1.9-1

Trust: 0.3

vendor:ciscomodel:ios 12.3bscope: - version: -

Trust: 0.3

vendor:securemodel:computing cyberguard tspscope:eqversion:0

Trust: 0.3

vendor:iscmodel:bind a1scope:eqversion:9.5

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.35

Trust: 0.3

vendor:sunmodel:opensolaris build snv 95scope: - version: -

Trust: 0.3

vendor:bluecatmodel:networks adonisscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.2.3.9

Trust: 0.3

vendor:nortelmodel:networks pmbbscope:eqversion:0

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:5.1

Trust: 0.3

vendor:yamahamodel:rt140iscope:eqversion:0

Trust: 0.3

vendor:hpmodel:tcp/ip services for openvms alphascope:eqversion:5.4

Trust: 0.3

vendor:yamahamodel:rt105iscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:4.2.11

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition sp2scope:eqversion:2003x64

Trust: 0.3

vendor:hpmodel:mpe/ixscope:eqversion:7.0

Trust: 0.3

vendor:redhatmodel:enterprise linux es ia64scope:eqversion:2.1

Trust: 0.3

vendor:novellmodel:netware sp2scope:eqversion:6.5

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.2

Trust: 0.3

vendor:junipermodel:networks screenosscope:eqversion:5.1

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition itaniumscope:eqversion:20030

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6

Trust: 0.3

vendor:ciscomodel:ios 12.3yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zhscope: - version: -

Trust: 0.3

vendor:pdnsdmodel:-parscope:neversion:1.2.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:microsoftmodel:windows xp professional editionscope:eqversion:x64

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.4.3

Trust: 0.3

vendor:bluemodel:coat systems packetshaperscope:eqversion:0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.4

Trust: 0.3

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:securemodel:computing sidewinder softwarescope:eqversion:5.2.1

Trust: 0.3

vendor:junipermodel:networks junose p0-2scope:eqversion:5.3.5

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:4.2

Trust: 0.3

vendor:pdnsdmodel:-parscope:eqversion:1.2.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.1

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.2.0.03

Trust: 0.3

vendor:iscmodel:bind p6scope:eqversion:8.2.2

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.17

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:6.2

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.3

vendor:astaromodel:security gatewayscope:eqversion:7

Trust: 0.3

vendor:windmodel:river systems linuxscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:hpmodel:mpe/ixscope:eqversion:6.5

Trust: 0.3

vendor:hpmodel:storage management appliancescope:eqversion:2.1

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.1.11.6

Trust: 0.3

vendor:ciscomodel:ios 12.3xbscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition itanium sp1scope:eqversion:2003

Trust: 0.3

vendor:bluecatmodel:networks adonisscope:eqversion:4.1.43

Trust: 0.3

vendor:iscmodel:bind a5scope:eqversion:9.4

Trust: 0.3

vendor:securemodel:computing sidewinder softwarescope:eqversion:5.0.0.03

Trust: 0.3

vendor:yamahamodel:rtx3000scope:eqversion:0

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:0

Trust: 0.3

vendor:f5model:bigipscope:eqversion:4.6.4

Trust: 0.3

vendor:ciscomodel:network registarscope:eqversion:6.1

Trust: 0.3

vendor:iscmodel:bind b3scope:eqversion:9.4

Trust: 0.3

vendor:ciscomodel:ios 12.2zlscope: - version: -

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.2.1.02

Trust: 0.3

vendor:microsoftmodel:windows xp tablet pc edition sp3scope: - version: -

Trust: 0.3

vendor:f5model:bigipscope:eqversion:9.3

Trust: 0.3

vendor:iscmodel:bind b4scope:eqversion:9.4

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3.7

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.3.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.4.3

Trust: 0.3

vendor:yukihiromodel:matsumoto rubyscope:eqversion:1.8.6

Trust: 0.3

vendor:iscmodel:bind rc3scope:eqversion:9.3.3

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2008.1

Trust: 0.3

vendor:sunmodel:solaris 8 sparcscope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.3

vendor:lucentmodel:vitalqipscope:eqversion:6.0

Trust: 0.3

vendor:lucentmodel:vitalqip sp1scope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:ios 12.3xwscope: - version: -

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.2

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.0.0.02

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.3.4

Trust: 0.3

vendor:microsoftmodel:windows server web edition sp1scope:eqversion:2003

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:4.0

Trust: 0.3

vendor:ipcopmodel:ipcopscope:neversion:1.4.19

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:iscmodel:bind -p1scope:eqversion:9.2.6

Trust: 0.3

vendor:novellmodel:netwarescope:eqversion:5.0

Trust: 0.3

vendor:citrixmodel:access gateway standard editionscope:eqversion:4.5.7

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:microsoftmodel:windows server sp4scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp4scope:eqversion:2000

Trust: 0.3

vendor:yamahamodel:rtx1100scope: - version: -

Trust: 0.3

vendor:yukihiromodel:matsumoto ruby -p229scope:eqversion:1.8.6

Trust: 0.3

vendor:ciscomodel:ios 12.0wcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xkscope: - version: -

Trust: 0.3

vendor:yukihiromodel:matsumoto ruby -p115scope:eqversion:1.8.5

Trust: 0.3

vendor:nortelmodel:networks self-service ccss7scope:eqversion:-0

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.2.0.04

Trust: 0.3

vendor:securemodel:computing cyberguard classicscope:eqversion:0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5.13

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.2.2

Trust: 0.3

vendor:yukihiromodel:matsumoto ruby -p286scope:eqversion:1.8.6

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:9.1

Trust: 0.3

vendor:novellmodel:netware sp5scope:eqversion:5.0

Trust: 0.3

vendor:f5model:bigipscope:eqversion:9.6.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 19scope: - version: -

Trust: 0.3

vendor:hpmodel:tcp/ip services for openvms integrityscope:eqversion:5.5

Trust: 0.3

vendor:citrixmodel:netscaler buildscope:eqversion:8.157.3

Trust: 0.3

vendor:ciscomodel:ios 12.3yxscope: - version: -

Trust: 0.3

vendor:securemodel:computing sidewinder softwarescope:eqversion:5.1.1

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.11

Trust: 0.3

vendor:yukihiromodel:matsumoto ruby -p22scope:eqversion:1.8.7

Trust: 0.3

vendor:microsoftmodel:windows server datacenter editionscope:eqversion:2003

Trust: 0.3

vendor:yukihiromodel:matsumoto ruby -p230scope:eqversion:1.8.6

Trust: 0.3

vendor:citrixmodel:access gateway standard editionscope:eqversion:4.5.6

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.2.1

Trust: 0.3

vendor:nortelmodel:networks nsna switchscope:eqversion:4070

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.2.3

Trust: 0.3

vendor:ciscomodel:ios 12.1ayscope: - version: -

Trust: 0.3

vendor:yamahamodel:rt105pscope:eqversion:0

Trust: 0.3

vendor:iscmodel:bind betascope:eqversion:8.2.3

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.5

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.3.2

Trust: 0.3

vendor:ciscomodel:ios 12.2byscope: - version: -

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20070

Trust: 0.3

vendor:iscmodel:bind 9.5.0a7scope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:nortelmodel:networks self-service peri workstationscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp2scope:eqversion:2000

Trust: 0.3

vendor:lucentmodel:vitalqipscope:eqversion:6.2

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6.1

Trust: 0.3

vendor:ciscomodel:ios 12.2bscope: - version: -

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.0.0.03

Trust: 0.3

vendor:yukihiromodel:matsumoto rubyscope:eqversion:1.8

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.1.13.7

Trust: 0.3

vendor:nortelmodel:networks optical software upgrade managerscope:eqversion:0

Trust: 0.3

vendor:iscmodel:bind b1scope:eqversion:9.2.7

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 0.3

vendor:f5model:bigipscope:eqversion:8.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 89scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server standard edition sp2scope:eqversion:2003

Trust: 0.3

vendor:ciscomodel:ios 12.2xuscope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:ipcopmodel:ipcopscope:neversion:1.4.20

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp2scope:eqversion:2000

Trust: 0.3

vendor:iscmodel:bind 9.5.1b1scope:neversion: -

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:0

Trust: 0.3

vendor:bluemodel:coat systems packetshaperscope:neversion:8.4

Trust: 0.3

vendor:microsoftmodel:windows professionalscope:eqversion:2000

Trust: 0.3

vendor:yamahamodel:rt102iscope:eqversion:0

Trust: 0.3

vendor:iscmodel:bind a4scope:eqversion:9.4

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.3.7

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:4.0

Trust: 0.3

vendor:hpmodel:tcp/ip services for openvms alphascope:eqversion:5.5

Trust: 0.3

vendor:iscmodel:bind 9.5.0a6scope: - version: -

Trust: 0.3

vendor:bluecatmodel:networks adonisscope:eqversion:5.1.8

Trust: 0.3

vendor:yamahamodel:rtv01scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios 12.2zescope: - version: -

Trust: 0.3

vendor:f5model:bigipscope:eqversion:9.4.3

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:7.10

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.3

Trust: 0.3

vendor:microsoftmodel:windows xp home sp2scope: - version: -

Trust: 0.3

vendor:hpmodel:tcp/ip services for openvms integrityscope:eqversion:5.6

Trust: 0.3

vendor:nortelmodel:networks ensm enterprise nmsscope:eqversion:-10.4

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:ios 12.4xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xgscope: - version: -

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:6.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:ciscomodel:network registarscope: - version: -

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.1.1

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.10

Trust: 0.3

vendor:f5model:bigipscope:eqversion:4.6

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0.1

Trust: 0.3

vendor:yamahamodel:rta54iscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios 12.3xcscope: - version: -

Trust: 0.3

vendor:bluemodel:coat systems packetshaperscope:neversion:8.3.2

Trust: 0.3

vendor:microsoftmodel:windows server enterprise editionscope:eqversion:2003

Trust: 0.3

vendor:iscmodel:bind p2scope:eqversion:8.2.2

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.6

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.0.1

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.4.1

Trust: 0.3

vendor:djbdnsmodel:djbdnsscope:neversion:0

Trust: 0.3

vendor:ciscomodel:ios 12.3ysscope: - version: -

Trust: 0.3

vendor:netbsdmodel:4,0 betascope: - version: -

Trust: 0.3

vendor:yukihiromodel:matsumoto ruby pre1scope:eqversion:1.8.2

Trust: 0.3

vendor:f5model:bigipscope:eqversion:9.6

Trust: 0.3

vendor:ciscomodel:ios 12.4xlscope: - version: -

Trust: 0.3

vendor:iscmodel:bind rc2scope:eqversion:9.2.7

Trust: 0.3

vendor:ciscomodel:ios 12.4xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:4.1.1

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:7.3

Trust: 0.3

vendor:microsoftmodel:windows server standard editionscope:eqversion:2003x64

Trust: 0.3

vendor:bluecatmodel:networks adonisscope:eqversion:5.1.1

Trust: 0.3

vendor:mandrakesoftmodel:multi network firewallscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.2

Trust: 0.3

vendor:iscmodel:bind a1scope:eqversion:9.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.3

vendor:gentoomodel:net-dns/dnsmasqscope:eqversion:2.43

Trust: 0.3

vendor:iscmodel:bind p7scope:eqversion:8.2.2

Trust: 0.3

vendor:ciscomodel:ios 12.2xcscope: - version: -

Trust: 0.3

vendor:iscmodel:bind rc1scope:eqversion:9.2.7

Trust: 0.3

vendor:nortelmodel:networks self-service mpsscope:eqversion:1000

Trust: 0.3

vendor:microsoftmodel:windows advanced serverscope:eqversion:2000

Trust: 0.3

vendor:rpathmodel:linuxscope:eqversion:1

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.4.1

Trust: 0.3

vendor:hpmodel:tcp/ip services for openvms alphascope:eqversion:5.6

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.4

Trust: 0.3

vendor:yukihiromodel:matsumoto rubyscope:eqversion:1.8.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:microsoftmodel:windows xp media center edition sp3scope: - version: -

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.3

Trust: 0.3

vendor:microsoftmodel:windows xp tablet pc edition sp1scope: - version: -

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.14

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:yukihiromodel:matsumoto rubyscope:eqversion:1.8.4

Trust: 0.3

vendor:ciscomodel:ios 12.2xgscope: - version: -

Trust: 0.3

vendor:hpmodel:mpe/ixscope:eqversion:7.5

Trust: 0.3

vendor:yamahamodel:rt200iscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios 12.3xhscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition sp2scope:eqversion:2003x64

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:iscmodel:bind p1scope:eqversion:8.2.2

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.0

Trust: 0.3

vendor:iscmodel:bind 9.4.3b2scope:neversion: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.3

vendor:microsoftmodel:windows server sp3scope:eqversion:2000

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:iscmodel:bind p5scope:eqversion:8.2.2

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:5.4

Trust: 0.3

vendor:bluemodel:coat systems directorscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows server standard edition sp1scope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows xp media center editionscope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp2scope:eqversion:10

Trust: 0.3

vendor:junipermodel:networks junosescope:eqversion:7.1.1

Trust: 0.3

vendor:microsoftmodel:windows server sp2scope:eqversion:2003x64

Trust: 0.3

vendor:sunmodel:opensolaris build snv 88scope: - version: -

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:4.0

Trust: 0.3

vendor:yamahamodel:rt58iscope:eqversion:0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2008.0

Trust: 0.3

vendor:junipermodel:networks junosescope:eqversion:0

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:6.1

Trust: 0.3

vendor:securemodel:computing sidewinder softwarescope:eqversion:5.2.0.02

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1

Trust: 0.3

vendor:bluecatmodel:networks adonisscope:eqversion:5.0.5

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.3

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.2

Trust: 0.3

vendor:nortelmodel:networks optical ambbscope:eqversion:0

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.2

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:iscmodel:bind -p2scope:eqversion:9.3.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.2.4

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:bluemodel:coat systems ishaperscope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:7.0

Trust: 0.3

vendor:f5model:bigipscope:eqversion:4.5.14

Trust: 0.3

vendor:junipermodel:networks junose p0-1scope:eqversion:7.1

Trust: 0.3

vendor:infobloxmodel:niosscope:eqversion:4

Trust: 0.3

vendor:ciscomodel:ios 12.3ydscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp3scope:eqversion:2000

Trust: 0.3

vendor:navisionmodel:financials serverscope:eqversion:3.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:4.0

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:8.0

Trust: 0.3

vendor:f5model:bigipscope:eqversion:4.6.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:8.1

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:4.2

Trust: 0.3

vendor:iscmodel:bind rc2scope:eqversion:9.3.3

Trust: 0.3

vendor:nortelmodel:networks optical rmbbscope:eqversion:0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.6.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.4.7

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp3scope:eqversion:2000

Trust: 0.3

vendor:ciscomodel:ios 12.3ymscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1.2

Trust: 0.3

vendor:ciscomodel:ios 12.4mrscope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.5.0a3scope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:7.10

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:2.0

Trust: 0.3

vendor:nortelmodel:networks optical application platformscope:eqversion:0

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:5.2

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.0.1

Trust: 0.3

vendor:pdnsdmodel:-parscope:eqversion:1.2.3

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:2.1

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.1.9

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:1.6

Trust: 0.3

vendor:sunmodel:solaris 8 x86scope: - version: -

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.3.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:sunmodel:solaris 10 sparcscope: - version: -

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.0.17.6

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 0.3

vendor:junipermodel:networks screenosscope:eqversion:5.2

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6.3

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:2.1

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:7.10

Trust: 0.3

vendor:microsoftmodel:windows professional sp3scope:eqversion:2000

Trust: 0.3

vendor:nortelmodel:networks srgscope:eqversion:1.0

Trust: 0.3

vendor:rpathmodel:appliance platform linux servicescope:eqversion:1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:nortelmodel:networks optical fmbbscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios 12.4xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xescope: - version: -

Trust: 0.3

vendor:nortelmodel:networks self-service mpsscope:eqversion:5000

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.2

Trust: 0.3

vendor:iscmodel:bind 9.3.5-p2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1eascope: - version: -

Trust: 0.3

vendor:hpmodel:tru64 unix b-3scope:eqversion:5.1.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1.1

Trust: 0.3

vendor:ciscomodel:ios 12.3xfscope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.5.0b2scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4xv

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.4

Trust: 0.3

vendor:novellmodel:netware sp3scope:eqversion:6.0

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:5.3

Trust: 0.3

vendor:ciscomodel:ios 12.3ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.1.1.3

Trust: 0.3

vendor:yukihiromodel:matsumoto rubyscope:eqversion:1.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:sunmodel:opensolarisscope:eqversion:0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.2.0.02

Trust: 0.3

vendor:microsoftmodel:windows xp homescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1dbscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server web editionscope:eqversion:2003

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:microsoftmodel:windows professional sp2scope:eqversion:2000

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0.3

Trust: 0.3

vendor:yamahamodel:rt107escope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows server sp2scope:eqversion:2000

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.3.3

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:yukihiromodel:matsumoto rubyscope:eqversion:1.8.2

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.3.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.2.1

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp1scope:eqversion:2000

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:2.5.4

Trust: 0.3

vendor:iscmodel:bind a2scope:eqversion:9.4

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.1

Trust: 0.3

vendor:openwallmodel:gnu/*/linux 2.0-stablescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xzscope: - version: -

Trust: 0.3

vendor:s u s emodel:novell linux desktopscope:eqversion:9.0

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:7.10

Trust: 0.3

vendor:f5model:firepassscope:eqversion:5.5

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6.2

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:4.0.3

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:10.2

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2008.1

Trust: 0.3

vendor:ciscomodel:network registarscope:eqversion:6.3

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.1

Trust: 0.3

vendor:microsoftmodel:windows server itaniumscope:eqversion:20030

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.6

Trust: 0.3

vendor:f5model:wanjetscope:eqversion:5.0.2

Trust: 0.3

vendor:yamahamodel:rtx1500scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zdscope: - version: -

Trust: 0.3

vendor:yamahamodel:srt100scope:eqversion:0

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:ios 12.1exscope: - version: -

Trust: 0.3

vendor:citrixmodel:netscaler buildscope:eqversion:8.047.8

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.4

Trust: 0.3

vendor:yukihiromodel:matsumoto rubyscope:eqversion:1.8.7

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.2

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:ios 12.3yiscope: - version: -

Trust: 0.3

vendor:lucentmodel:vitalqipscope:eqversion:7.x

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xescope: - version: -

Trust: 0.3

vendor:yamahamodel:rt103iscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows server itanium sp2scope:eqversion:2003

Trust: 0.3

vendor:pythonmodel:dns library pydnsscope:eqversion:2.3

Trust: 0.3

vendor:microsoftmodel:windows xp home sp3scope: - version: -

Trust: 0.3

vendor:lucentmodel:vitalqipscope:eqversion:5.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.4.6

Trust: 0.3

vendor:ciscomodel:ios 12.0xrscope: - version: -

Trust: 0.3

vendor:nortelmodel:networks multimedia comm mcs5100scope: - version: -

Trust: 0.3

vendor:iscmodel:bind a3scope:eqversion:9.4

Trust: 0.3

vendor:ingatemodel:siparatorscope:neversion:4.6.4

Trust: 0.3

vendor:ciscomodel:ios 12.4tscope: - version: -

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.13

Trust: 0.3

vendor:ciscomodel:ios 12.2ynscope: - version: -

Trust: 0.3

vendor:junipermodel:networks junos 8.5.r1scope: - version: -

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3.9

Trust: 0.3

vendor:ciscomodel:ios 12.2bwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xlscope: - version: -

Trust: 0.3

vendor:securemodel:computing sidewinder softwarescope:eqversion:5.0.0.01

Trust: 0.3

vendor:netbsdmodel:3.1 rc3scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server datacenter editionscope:eqversion:2003x64

Trust: 0.3

vendor:applemodel:ipod touchscope:neversion:2.1

Trust: 0.3

vendor:sunmodel:opensolaris build snv 01scope: - version: -

Trust: 0.3

vendor:iscmodel:bind rc2scope:eqversion:9.4

Trust: 0.3

vendor:sunmodel:opensolaris build snv 92scope: - version: -

Trust: 0.3

vendor:yamahamodel:rt80iscope:eqversion:0

Trust: 0.3

vendor:rpathmodel:linuxscope:eqversion:2

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:5.5

Trust: 0.3

vendor:ciscomodel:ios 12.3xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3vascope: - version: -

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.1

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp2scope:eqversion:10

Trust: 0.3

vendor:f5model:bigipscope:eqversion:4.5.6

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.2

Trust: 0.3

vendor:securemodel:computing sidewinder softwarescope:eqversion:5.1.0.01

Trust: 0.3

vendor:yamahamodel:rtx2000scope: - version: -

Trust: 0.3

vendor:nortelmodel:networks bcmscope:eqversion:200

Trust: 0.3

vendor:ciscomodel:ios 12.2yvscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server sp1scope:eqversion:2003

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.3

vendor:openbsdmodel:-currentscope: - version: -

Trust: 0.3

vendor:ciscomodel:network registarscope:eqversion:7.0

Trust: 0.3

vendor:pdnsdmodel:-parscope:eqversion:1.2.4

Trust: 0.3

vendor:yamahamodel:rt100iscope:eqversion:0

Trust: 0.3

vendor:junipermodel:networks junose p0-1scope:eqversion:6.1.3

Trust: 0.3

vendor:infobloxmodel:dns one appliancescope:eqversion:2

Trust: 0.3

vendor:iscmodel:bind -p1scope:eqversion:9.3.2

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:neversion:5.2.4.3

Trust: 0.3

vendor:ciscomodel:ios 12.4xdscope: - version: -

Trust: 0.3

vendor:nortelmodel:networks self-service ccxmlscope:eqversion:0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:9.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.3.6

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.12

Trust: 0.3

vendor:f5model:bigipscope:eqversion:4.5.10

Trust: 0.3

vendor:f5model:firepassscope:eqversion:6.0.2

Trust: 0.3

vendor:microsoftmodel:windows xp tablet pc editionscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4mdscope: - version: -

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.2.1.7

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20080

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition sp1scope:eqversion:2003

Trust: 0.3

vendor:nortelmodel:networks self-service peri applicationscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:network registarscope:neversion:7.0.1

Trust: 0.3

vendor:susemodel:linux enterprise sdk 10.sp1scope: - version: -

Trust: 0.3

vendor:securemodel:computing sidewinder softwarescope:eqversion:5.2.0.01

Trust: 0.3

vendor:bluemodel:coat systems ishaperscope:neversion:8.3.2

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2007.1

Trust: 0.3

vendor:yukihiromodel:matsumoto ruby pre4scope:eqversion:1.8.2

Trust: 0.3

vendor:microsoftmodel:windows xp professional edition sp2scope:eqversion:x64

Trust: 0.3

vendor:hpmodel:nonstop serverscope:eqversion:6

Trust: 0.3

vendor:pdnsdmodel:-parscope:eqversion:1.2.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.4.2

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5.12

Trust: 0.3

vendor:novellmodel:netware sp6scope:eqversion:6.5

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:7.04

Trust: 0.3

vendor:novellmodel:netware sp3scope:eqversion:6.5

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5

Trust: 0.3

vendor:securemodel:computing sidewinder softwarescope:eqversion:5.1.1.01

Trust: 0.3

vendor:novellmodel:netwarescope:eqversion:6.0

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:yukihiromodel:matsumoto ruby -p71scope:eqversion:1.8.7

Trust: 0.3

vendor:ciscomodel:ios 12.3bwscope: - version: -

Trust: 0.3

vendor:securemodel:computing sidewinder softwarescope:eqversion:5.0.0.04

Trust: 0.3

vendor:ciscomodel:ios 12.3yfscope: - version: -

Trust: 0.3

vendor:applemodel:iphonescope:neversion:2.1

Trust: 0.3

vendor:yukihiromodel:matsumoto rubyscope:eqversion:1.8.5

Trust: 0.3

vendor:securemodel:computing sidewinder softwarescope:eqversion:5.1

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:5.6

Trust: 0.3

vendor:f5model:bigipscope:eqversion:9.3.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.8

Trust: 0.3

vendor:ciscomodel:ios 12.3yzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zgscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp professional sp3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ytscope: - version: -

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.6.1

Trust: 0.3

vendor:ingatemodel:firewallscope:neversion:4.6.4

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xsscope: - version: -

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.15

Trust: 0.3

vendor:novellmodel:open enterprise serverscope:eqversion:0

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.0.0.01

Trust: 0.3

vendor:f5model:bigipscope:eqversion:4.6.3

Trust: 0.3

vendor:f5model:firepassscope:eqversion:5.5.2

Trust: 0.3

vendor:iscmodel:bind 9.5.0b1scope: - version: -

Trust: 0.3

vendor:f5model:bigipscope:eqversion:9.4

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2007.1

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:7.10

Trust: 0.3

vendor:iscmodel:bind b1scope:eqversion:9.3.3

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.1.1.2

Trust: 0.3

vendor:novellmodel:netware sp1scope:eqversion:6.5

Trust: 0.3

vendor:citrixmodel:access gateway standard edition rev ascope:eqversion:4.5.7

Trust: 0.3

vendor:yukihiromodel:matsumoto rubyscope:eqversion:1.8.3

Trust: 0.3

vendor:iscmodel:bind 9.5.0a5scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp tablet pc edition sp2scope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:10

Trust: 0.3

vendor:ciscomodel:ios 12.4xjscope: - version: -

Trust: 0.3

vendor:nominummodel:software vantioscope:eqversion:3

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:7.0

Trust: 0.3

vendor:f5model:firepassscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.4(21)

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.5

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.2.5

Trust: 0.3

vendor:yamahamodel:rta50iscope:eqversion:0

Trust: 0.3

vendor:rpathmodel:appliance platform linux servicescope:eqversion:2

Trust: 0.3

vendor:ciscomodel:ios 12.4xcscope: - version: -

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 0.3

vendor:yukihiromodel:matsumoto ruby -p230scope:eqversion:1.8.5

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:neversion:5.5.11

Trust: 0.3

vendor:ciscomodel:network registarscope:neversion:6.3.1.5

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:4.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.1

Trust: 0.3

vendor:bluecatmodel:networks adonisscope:eqversion:5.0.2.8

Trust: 0.3

vendor:junipermodel:networks junose p0-7scope:eqversion:7.0.1

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.18

Trust: 0.3

vendor:f5model:bigipscope:eqversion:4.5.13

Trust: 0.3

vendor:ciscomodel:ios 12.2yuscope: - version: -

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp4scope:eqversion:2000

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.2.7

Trust: 0.3

vendor:microsoftmodel:windows datacenter serverscope:eqversion:2000

Trust: 0.3

vendor:yamahamodel:rt60wscope:eqversion:0

Trust: 0.3

vendor:f5model:bigipscope:eqversion:4.6.2

Trust: 0.3

vendor:microsoftmodel:windows xp professional sp1scope: - version: -

Trust: 0.3

vendor:yamahamodel:rt57iscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server itanium sp1scope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server sp2scope:eqversion:2003

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.1.1.1

Trust: 0.3

vendor:iscmodel:bind rc3scope:eqversion:9.2.7

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.1

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:4.1.3

Trust: 0.3

vendor:yukihiromodel:matsumoto ruby -p114scope:eqversion:1.8.6

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:nortelmodel:networks ensm enterprise nmsscope:eqversion:-10.5

Trust: 0.3

vendor:yamahamodel:rt140pscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios 12.2xkscope: - version: -

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 0.3

vendor:yukihiromodel:matsumoto ruby -p287scope:neversion:1.8.6

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:1.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3.8

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.1.15

Trust: 0.3

vendor:f5model:wanjetscope:eqversion:5.0

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:10

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:6.4

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.6

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.2.1.10

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:1.2

Trust: 0.3

vendor:redhatmodel:enterprise linux ws ia64scope:eqversion:2.1

Trust: 0.3

vendor:securemodel:computing sidewinder softwarescope:eqversion:5.0.0.02

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:4.0

Trust: 0.3

vendor:yukihiromodel:matsumoto ruby -p2scope:eqversion:1.8.5

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:4.0

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:5.7

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.1.1.4

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5.11

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 0.3

vendor:iscmodel:bind rc1scope:eqversion:9.3.3

Trust: 0.3

vendor:iscmodel:bind bscope:eqversion:9.3.3

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:netbsdmodel:3,1 rc1scope: - version: -

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.3

vendor:nortelmodel:networks self-service web centric ccxmlscope:eqversion: -

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:2.5.5

Trust: 0.3

vendor:citrixmodel:access gateway standard editionscope:eqversion:4.5

Trust: 0.3

vendor:iscmodel:bind -p1scope:eqversion:9.4.1

Trust: 0.3

vendor:novellmodel:netwarescope:eqversion:6.5

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.4.1

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:4.0

Trust: 0.3

vendor:securemodel:computing sidewinder softwarescope:eqversion:5.2.0.04

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:6.3

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.1.1

Trust: 0.3

vendor:ciscomodel:ios 12.3yuscope: - version: -

Trust: 0.3

vendor:nortelmodel:networks self-service mpsscope:eqversion:10000

Trust: 0.3

vendor:yukihiromodel:matsumoto rubyscope:eqversion:1.9-2

Trust: 0.3

vendor:junipermodel:networks junosescope:eqversion:7.0.2

Trust: 0.3

vendor:hpmodel:tru64 unix b-4scope:eqversion:5.1.0

Trust: 0.3

vendor:ciscomodel:ios 12.3xascope: - version: -

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.4

Trust: 0.3

vendor:novellmodel:netware sp5scope:eqversion:6.5

Trust: 0.3

vendor:nortelmodel:networks trail manager route advisorscope:eqversion:0

Trust: 0.3

vendor:yukihiromodel:matsumoto ruby pre2scope:eqversion:1.8.2

Trust: 0.3

vendor:ciscomodel:ios 12.4xbscope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 9 sparcscope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 02scope: - version: -

Trust: 0.3

vendor:bluemodel:coat systems directorscope:neversion:5.2.2.5

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:7.04

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:1.4.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.1.1

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:8.4

Trust: 0.3

vendor:ciscomodel:ios 12.4xwscope: - version: -

Trust: 0.3

vendor:citrixmodel:access gateway advanced editionscope:eqversion:4.5

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp1scope:eqversion:2000

Trust: 0.3

vendor:novellmodel:netware sp4scope:eqversion:6.5

Trust: 0.3

vendor:novellmodel:netware sp7scope:eqversion:6.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:iscmodel:bind b1scope:eqversion:9.4

Trust: 0.3

vendor:securemodel:computing sidewinder g2scope:eqversion:6.1.0.01

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:ciscomodel:ios 12.4xmscope: - version: -

Trust: 0.3

vendor:yamahamodel:rt105escope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios 12.4swscope: - version: -

Trust: 0.3

vendor:yamahamodel:rt140fscope:eqversion:0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

vendor:f5model:firepassscope:eqversion:6.0.1

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:4.0

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:7.04

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.0.5

Trust: 0.3

vendor:ciscomodel:ios 12.3ykscope: - version: -

Trust: 0.3

vendor:lucentmodel:vitalqipscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.4

Trust: 0.3

vendor:microsoftmodel:windows professional sp1scope:eqversion:2000

Trust: 0.3

vendor:f5model:bigipscope:eqversion:4.5.12

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2

Trust: 0.3

vendor:f5model:bigipscope:eqversion:4.5

Trust: 0.3

vendor:yamahamodel:rt56vscope:eqversion:0

Trust: 0.3

vendor:yamahamodel:rtv700scope: - version: -

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.0

Trust: 0.3

vendor:novellmodel:netware sp6scope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.5.7

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.2

Trust: 0.3

vendor:securemodel:computing sidewinder softwarescope:eqversion:5.0

Trust: 0.3

vendor:microsoftmodel:windows xp professionalscope: - version: -

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.3

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.0

Trust: 0.3

vendor:novellmodel:netware sp1scope:eqversion:6.0

Trust: 0.3

vendor:iscmodel:bind b2scope:eqversion:9.4

Trust: 0.3

vendor:f5model:bigipscope:eqversion:9.4.5

Trust: 0.3

vendor:junipermodel:networks junosescope:eqversion:6.0.4

Trust: 0.3

vendor:ciscomodel:ios 12.2xtscope: - version: -

Trust: 0.3

vendor:yamahamodel:rtw65iscope:eqversion:0

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.3

vendor:ciscomodel:ios 12.1xcscope: - version: -

Trust: 0.3

vendor:yamahamodel:rt300iscope: - version: -

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:3.0.2

Trust: 0.3

vendor:iscmodel:bind p4scope:eqversion:8.2.2

Trust: 0.3

vendor:openwallmodel:gnu/*/linux 2.0-currentscope: - version: -

Trust: 0.3

vendor:iscmodel:bind -p1scope:eqversion:8.4.7

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.2

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:7.04

Trust: 0.3

vendor:nortelmodel:networks self-service wvadsscope:eqversion:0

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:4.0

Trust: 0.3

vendor:nixumodel:secure name serverscope:eqversion:1

Trust: 0.3

vendor:yukihiromodel:matsumoto ruby pre3scope:eqversion:1.8.2

Trust: 0.3

vendor:microsoftmodel:windows server web edition sp2scope:eqversion:2003

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:ciscomodel:ios 12.2yoscope: - version: -

Trust: 0.3

vendor:windmodel:river systems linuxscope:eqversion:0

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:neversion:4.2.8.7

Trust: 0.3

vendor:ciscomodel:ios 12.4xqscope: - version: -

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:11.0

Trust: 0.3

vendor:microsoftmodel:windows xpscope:eqversion:0

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 0.3

vendor:ciscomodel:ios 12.2zjscope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:3.0.1

Trust: 0.3

vendor:susemodel:linux enterprise server sp2scope:eqversion:10

Trust: 0.3

vendor:nominummodel:software caching name serverscope:eqversion:3

Trust: 0.3

vendor:ciscomodel:ios 12.2ylscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp media center edition sp2scope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processor ia64scope:eqversion:2.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.0

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:3.1

Trust: 0.3

vendor:yamahamodel:rta55iscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:redmodel:hat enterprise linux as ia64scope:eqversion:2.1

Trust: 0.3

vendor:iscmodel:bind rc1scope:eqversion:9.4

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition itaniumscope:eqversion:20030

Trust: 0.3

vendor:ciscomodel:ios 12.3xjscope: - version: -

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:3.1

Trust: 0.3

vendor:yukihiromodel:matsumoto ruby -p72scope:neversion:1.8.7

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5.14

Trust: 0.3

vendor:bluemodel:coat systems proxyrascope:eqversion:0

Trust: 0.3

vendor:bluemodel:coat systems proxyrascope:neversion:2.3.2.1

Trust: 0.3

vendor:yamahamodel:rtx1000scope: - version: -

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.1.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yescope: - version: -

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.4.5

Trust: 0.3

vendor:nortelmodel:networks self-service speech serverscope:eqversion:0

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:iscmodel:bind a2scope:eqversion:9.5

Trust: 0.3

vendor:iscmodel:bind a6scope:eqversion:9.4

Trust: 0.3

vendor:sunmodel:opensolaris build snv 22scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.5.0a4scope: - version: -

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.0

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:pdnsdmodel:1.2-parscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xrscope: - version: -

Trust: 0.3

vendor:netbsdmodel:currentscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server sp1scope:eqversion:2003x64

Trust: 0.3

vendor:bluemodel:coat systems directorscope:neversion:4.2.2.4

Trust: 0.3

vendor:ciscomodel:ios 12.2ymscope: - version: -

Trust: 0.3

vendor:nortelmodel:networks nsna switchscope:eqversion:4050

Trust: 0.3

vendor:ciscomodel:ios 12.0tscope: - version: -

Trust: 0.3

vendor:novellmodel:netware sp2scope:eqversion:6.0

Trust: 0.3

vendor:yamahamodel:rta52iscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:4.0

Trust: 0.3

vendor:bluecatmodel:networks adonisscope:eqversion:5.0

Trust: 0.3

vendor:f5model:bigipscope:eqversion:4.5.11

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:3.0

Trust: 0.3

vendor:securemodel:computing sidewinder softwarescope:eqversion:5.1.0.02

Trust: 0.3

vendor:securemodel:computing sidewinder g2scope:eqversion:6.1.0.02

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.4.4

Trust: 0.3

vendor:microsoftmodel:windows server standard editionscope:eqversion:2003

Trust: 0.3

vendor:ciscomodel:ios 12.2czscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1tscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:ciscomodel:ios 12.2zfscope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.5.0-p2scope:neversion: -

Trust: 0.3

vendor:netbsdmodel:beta2scope:eqversion:4.0

Trust: 0.3

vendor:yamahamodel:rtw65bscope:eqversion:0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processorscope:eqversion:2.1

Trust: 0.3

vendor:microsoftmodel:windows server enterprise editionscope:eqversion:2003x64

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.7

Trust: 0.3

vendor:sunmodel:opensolaris build snv 13scope: - version: -

Trust: 0.3

vendor:novellmodel:netwarescope:eqversion:5.1

Trust: 0.3

vendor:iscmodel:bind p3scope:eqversion:8.2.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:4.3

Trust: 0.3

vendor:sunmodel:opensolaris build snv 91scope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:ciscomodel:ios 12.3tpcscope: - version: -

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.1.0.01

Trust: 0.3

vendor:s u s emodel:novell linux posscope:eqversion:9

Trust: 0.3

vendor:novellmodel:netware sp5scope:eqversion:5.1

Trust: 0.3

vendor:iscmodel:bind -p2scope:eqversion:9.2.6

Trust: 0.3

vendor:sunmodel:opensolaris build snv 64scope: - version: -

Trust: 0.3

vendor:gentoomodel:net-dns/dnsmasqscope:neversion:2.45

Trust: 0.3

vendor:securemodel:computing sidewinder softwarescope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.0.3

Trust: 0.3

vendor:junipermodel:networks junose p0-6scope:eqversion:6.0.3

Trust: 0.3

vendor:microsoftmodel:windows xp media center edition sp1scope: - version: -

Trust: 0.3

vendor:novellmodel:netware sp4scope:eqversion:5.1

Trust: 0.3

vendor:microsoftmodel:windows professional sp4scope:eqversion:2000

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.2.6

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.16

Trust: 0.3

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.3

vendor:securemodel:computing sidewinder softwarescope:eqversion:5.2.0.03

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3

Trust: 0.3

vendor:ciscomodel:ios 12.3yascope: - version: -

Trust: 0.3

vendor:nortelmodel:networks self service voicexmlscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios 12.4xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:cns network registrarscope:eqversion:6.1

Trust: 0.3

vendor:yamahamodel:rt140escope:eqversion:0

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.2.0.01

Trust: 0.3

vendor:microsoftmodel:windows xp professional sp2scope: - version: -

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1.3

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:4.2.7

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:10.3

Trust: 0.3

vendor:pdnsdmodel:-parscope:eqversion:1.2.6

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:6.3

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:eqversion:0

Trust: 0.3

vendor:nortelmodel:networks optical trail managerscope:eqversion:0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2008.0

Trust: 0.3

vendor:sunmodel:solaris 9 x86scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.4.2-p2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0dbscope: - version: -

Trust: 0.3

vendor:bluecatmodel:networks adonisscope:eqversion:5.1.7

Trust: 0.3

vendor:securemodel:computing sidewinder softwarescope:eqversion:5.2.1.02

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.1.1.01

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition sp1scope:eqversion:2003

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.0.0.04

Trust: 0.3

vendor:ciscomodel:ios 12.0dcscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server sp1scope:eqversion:2000

Trust: 0.3

vendor:ciscomodel:ios 12.2tpcscope: - version: -

Trust: 0.3

vendor:yukihiromodel:matsumoto ruby -p231scope:eqversion:1.8.5

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:8.3.1

Trust: 0.3

vendor:ciscomodel:ios 12.2yjscope: - version: -

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.2.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition itanium sp1scope:eqversion:2003

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.4

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.1.0.02

Trust: 0.3

vendor:yukihiromodel:matsumoto ruby -p21scope:eqversion:1.8.7

Trust: 0.3

vendor:f5model:bigipscope:eqversion:4.5.9

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:2000

Trust: 0.3

sources: CERT/CC: VU#800113 // CERT/CC: VU#252735 // BID: 30131 // NVD: CVE-2008-1447

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-1447
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#800113
value: 27.54

Trust: 0.8

CARNEGIE MELLON: VU#252735
value: 3.83

Trust: 0.8

VULHUB: VHN-31572
value: MEDIUM

Trust: 0.1

VULMON: CVE-2008-1447
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-1447
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-31572
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2008-1447
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 4.0
version: 3.1

Trust: 1.0

sources: CERT/CC: VU#800113 // CERT/CC: VU#252735 // VULHUB: VHN-31572 // VULMON: CVE-2008-1447 // NVD: CVE-2008-1447

PROBLEMTYPE DATA

problemtype:CWE-331

Trust: 1.1

problemtype:CWE-310

Trust: 0.1

sources: VULHUB: VHN-31572 // NVD: CVE-2008-1447

THREAT TYPE

network

Trust: 0.3

sources: BID: 30131

TYPE

spoof

Trust: 0.4

sources: PACKETSTORM: 68412 // PACKETSTORM: 69021 // PACKETSTORM: 68038 // PACKETSTORM: 68546

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-31572 // VULMON: CVE-2008-1447

PATCH

title:Debian CVElist Bug Report Logs: dnsmasq: appears to be vulnerable to cache poisoning attack CVE-2008-1447url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=bea0103df57677c569776d970bb2ff1a

Trust: 0.1

title:Ubuntu Security Notice: bind9 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-622-1

Trust: 0.1

title:Ubuntu Security Notice: dnsmasq vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-627-1

Trust: 0.1

title:Debian Security Advisories: DSA-1605-1 glibc -- DNS cache poisoningurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=26abd8c8b0e5ca972a55a1b90d3fdfc5

Trust: 0.1

title:Debian Security Advisories: DSA-1617-1 refpolicy -- incompatible policyurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=3418f614f56d497e28f842674f8d8f8c

Trust: 0.1

title:Debian Security Advisories: DSA-1603-1 bind9 -- DNS cache poisoningurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=23e55365f62c349622abb2d713a280af

Trust: 0.1

title:Debian CVElist Bug Report Logs: appears to be vulnerable to cache poisoning attack CVE-2008-1447url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=9e131108e982a49c97c4f3c5801dfb53

Trust: 0.1

title:Debian CVElist Bug Report Logs: python-dns vulnerable to CVE-2008-1447 DNS source port guessableurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=2a465496dabf8f2d87b1ff911ad8df9b

Trust: 0.1

title:Symantec Security Advisories: SA26 : DNS Cache Poisoning Vulnerability (CERT VU#800113)url:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=078765ce503e834a2fa43ae116b70180

Trust: 0.1

title:Citrix Security Bulletins: Archive: Vulnerability in Access Gateway Standard and Advanced Edition Appliance firmware could result in DNS Cache Poisoningurl:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=df5619e77c6173020dc0459f4b4bf1f2

Trust: 0.1

title:Citrix Security Bulletins: Archive: Vulnerability in NetScaler and Access Gateway Enterprise Edition could result in DNS Cache Poisoningurl:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=5c63f9f5138045493cfb7d220588077b

Trust: 0.1

title:Ubuntu Security Notice: ruby1.8 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-651-1

Trust: 0.1

title:VMware Security Advisories: Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX, VMware VCB address information disclosure, privilege escalation and other security issues.url:https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories&qid=f3db6c283715ce027fe46e96804874b4

Trust: 0.1

sources: VULMON: CVE-2008-1447

EXTERNAL IDS

db:NVDid:CVE-2008-1447

Trust: 2.7

db:CERT/CCid:VU#800113

Trust: 2.3

db:BIDid:30131

Trust: 1.5

db:SECUNIAid:31430

Trust: 1.3

db:VUPENid:ADV-2008-2025

Trust: 1.2

db:VUPENid:ADV-2009-0297

Trust: 1.2

db:VUPENid:ADV-2008-2334

Trust: 1.2

db:VUPENid:ADV-2008-2383

Trust: 1.2

db:VUPENid:ADV-2008-2113

Trust: 1.2

db:VUPENid:ADV-2008-2558

Trust: 1.2

db:VUPENid:ADV-2008-2019

Trust: 1.2

db:VUPENid:ADV-2008-2377

Trust: 1.2

db:VUPENid:ADV-2008-2584

Trust: 1.2

db:VUPENid:ADV-2008-2342

Trust: 1.2

db:VUPENid:ADV-2010-0622

Trust: 1.2

db:VUPENid:ADV-2008-2166

Trust: 1.2

db:VUPENid:ADV-2008-2051

Trust: 1.2

db:VUPENid:ADV-2008-2092

Trust: 1.2

db:VUPENid:ADV-2008-2029

Trust: 1.2

db:VUPENid:ADV-2008-2384

Trust: 1.2

db:VUPENid:ADV-2008-2268

Trust: 1.2

db:VUPENid:ADV-2008-2052

Trust: 1.2

db:VUPENid:ADV-2008-2549

Trust: 1.2

db:VUPENid:ADV-2008-2197

Trust: 1.2

db:VUPENid:ADV-2009-0311

Trust: 1.2

db:VUPENid:ADV-2008-2055

Trust: 1.2

db:VUPENid:ADV-2008-2467

Trust: 1.2

db:VUPENid:ADV-2008-2123

Trust: 1.2

db:VUPENid:ADV-2008-2482

Trust: 1.2

db:VUPENid:ADV-2008-2525

Trust: 1.2

db:VUPENid:ADV-2008-2023

Trust: 1.2

db:VUPENid:ADV-2008-2582

Trust: 1.2

db:VUPENid:ADV-2008-2114

Trust: 1.2

db:VUPENid:ADV-2008-2196

Trust: 1.2

db:VUPENid:ADV-2008-2139

Trust: 1.2

db:VUPENid:ADV-2008-2466

Trust: 1.2

db:VUPENid:ADV-2008-2050

Trust: 1.2

db:VUPENid:ADV-2008-2195

Trust: 1.2

db:VUPENid:ADV-2008-2291

Trust: 1.2

db:VUPENid:ADV-2008-2030

Trust: 1.2

db:SECTRACKid:1020548

Trust: 1.2

db:SECTRACKid:1020578

Trust: 1.2

db:SECTRACKid:1020448

Trust: 1.2

db:SECTRACKid:1020558

Trust: 1.2

db:SECTRACKid:1020702

Trust: 1.2

db:SECTRACKid:1020440

Trust: 1.2

db:SECTRACKid:1020575

Trust: 1.2

db:SECTRACKid:1020437

Trust: 1.2

db:SECTRACKid:1020802

Trust: 1.2

db:SECTRACKid:1020449

Trust: 1.2

db:SECTRACKid:1020579

Trust: 1.2

db:SECTRACKid:1020561

Trust: 1.2

db:SECTRACKid:1020804

Trust: 1.2

db:SECTRACKid:1020577

Trust: 1.2

db:SECTRACKid:1020560

Trust: 1.2

db:SECTRACKid:1020651

Trust: 1.2

db:SECTRACKid:1020653

Trust: 1.2

db:SECTRACKid:1020438

Trust: 1.2

db:SECTRACKid:1020576

Trust: 1.2

db:SECUNIAid:31209

Trust: 1.2

db:SECUNIAid:31197

Trust: 1.2

db:SECUNIAid:31422

Trust: 1.2

db:SECUNIAid:30977

Trust: 1.2

db:SECUNIAid:31151

Trust: 1.2

db:SECUNIAid:31354

Trust: 1.2

db:SECUNIAid:31093

Trust: 1.2

db:SECUNIAid:31212

Trust: 1.2

db:SECUNIAid:31207

Trust: 1.2

db:SECUNIAid:31221

Trust: 1.2

db:SECUNIAid:31254

Trust: 1.2

db:SECUNIAid:31451

Trust: 1.2

db:SECUNIAid:31169

Trust: 1.2

db:SECUNIAid:30988

Trust: 1.2

db:SECUNIAid:30973

Trust: 1.2

db:SECUNIAid:31687

Trust: 1.2

db:SECUNIAid:31199

Trust: 1.2

db:SECUNIAid:30980

Trust: 1.2

db:SECUNIAid:31137

Trust: 1.2

db:SECUNIAid:30998

Trust: 1.2

db:SECUNIAid:31014

Trust: 1.2

db:SECUNIAid:31065

Trust: 1.2

db:SECUNIAid:31882

Trust: 1.2

db:SECUNIAid:31019

Trust: 1.2

db:SECUNIAid:31153

Trust: 1.2

db:SECUNIAid:31482

Trust: 1.2

db:SECUNIAid:31495

Trust: 1.2

db:SECUNIAid:33178

Trust: 1.2

db:SECUNIAid:33714

Trust: 1.2

db:SECUNIAid:31213

Trust: 1.2

db:SECUNIAid:31326

Trust: 1.2

db:SECUNIAid:31052

Trust: 1.2

db:SECUNIAid:31011

Trust: 1.2

db:SECUNIAid:31588

Trust: 1.2

db:SECUNIAid:31033

Trust: 1.2

db:SECUNIAid:31031

Trust: 1.2

db:SECUNIAid:30979

Trust: 1.2

db:SECUNIAid:31022

Trust: 1.2

db:SECUNIAid:31094

Trust: 1.2

db:SECUNIAid:31030

Trust: 1.2

db:SECUNIAid:31204

Trust: 1.2

db:SECUNIAid:30925

Trust: 1.2

db:SECUNIAid:31072

Trust: 1.2

db:SECUNIAid:31152

Trust: 1.2

db:SECUNIAid:31237

Trust: 1.2

db:SECUNIAid:31012

Trust: 1.2

db:SECUNIAid:33786

Trust: 1.2

db:SECUNIAid:31143

Trust: 1.2

db:SECUNIAid:31236

Trust: 1.2

db:SECUNIAid:31900

Trust: 1.2

db:SECUNIAid:30989

Trust: 1.2

db:SECUNIAid:31823

Trust: 1.2

db:USCERTid:TA08-190B

Trust: 1.2

db:USCERTid:TA08-260A

Trust: 1.2

db:USCERTid:TA08-190A

Trust: 1.2

db:EXPLOIT-DBid:6130

Trust: 1.2

db:EXPLOIT-DBid:6123

Trust: 1.2

db:EXPLOIT-DBid:6122

Trust: 1.2

db:SECUNIAid:26195

Trust: 0.9

db:EXPLOIT-DBid:4266

Trust: 0.8

db:CERT/CCid:VU#252735

Trust: 0.8

db:PACKETSTORMid:68038

Trust: 0.2

db:PACKETSTORMid:68412

Trust: 0.2

db:PACKETSTORMid:73060

Trust: 0.2

db:PACKETSTORMid:68288

Trust: 0.2

db:PACKETSTORMid:96747

Trust: 0.2

db:PACKETSTORMid:73732

Trust: 0.2

db:PACKETSTORMid:68691

Trust: 0.2

db:PACKETSTORMid:68360

Trust: 0.2

db:PACKETSTORMid:68546

Trust: 0.2

db:PACKETSTORMid:68878

Trust: 0.1

db:PACKETSTORMid:68755

Trust: 0.1

db:PACKETSTORMid:68118

Trust: 0.1

db:PACKETSTORMid:68502

Trust: 0.1

db:PACKETSTORMid:68061

Trust: 0.1

db:PACKETSTORMid:74443

Trust: 0.1

db:PACKETSTORMid:94774

Trust: 0.1

db:PACKETSTORMid:68199

Trust: 0.1

db:PACKETSTORMid:68183

Trust: 0.1

db:PACKETSTORMid:68068

Trust: 0.1

db:PACKETSTORMid:68471

Trust: 0.1

db:PACKETSTORMid:70207

Trust: 0.1

db:PACKETSTORMid:68039

Trust: 0.1

db:PACKETSTORMid:68036

Trust: 0.1

db:PACKETSTORMid:68500

Trust: 0.1

db:PACKETSTORMid:68037

Trust: 0.1

db:PACKETSTORMid:68473

Trust: 0.1

db:PACKETSTORMid:68129

Trust: 0.1

db:PACKETSTORMid:68554

Trust: 0.1

db:PACKETSTORMid:68063

Trust: 0.1

db:PACKETSTORMid:68543

Trust: 0.1

db:SEEBUGid:SSVID-65607

Trust: 0.1

db:VULHUBid:VHN-31572

Trust: 0.1

db:VULMONid:CVE-2008-1447

Trust: 0.1

db:PACKETSTORMid:69536

Trust: 0.1

db:PACKETSTORMid:69643

Trust: 0.1

db:PACKETSTORMid:69021

Trust: 0.1

db:PACKETSTORMid:58035

Trust: 0.1

sources: CERT/CC: VU#800113 // CERT/CC: VU#252735 // VULHUB: VHN-31572 // VULMON: CVE-2008-1447 // BID: 30131 // PACKETSTORM: 68412 // PACKETSTORM: 73732 // PACKETSTORM: 68288 // PACKETSTORM: 68691 // PACKETSTORM: 69536 // PACKETSTORM: 68360 // PACKETSTORM: 73060 // PACKETSTORM: 69643 // PACKETSTORM: 69021 // PACKETSTORM: 96747 // PACKETSTORM: 68038 // PACKETSTORM: 68546 // PACKETSTORM: 58035 // NVD: CVE-2008-1447

REFERENCES

url:http://www.kb.cert.org/vuls/id/800113

Trust: 1.6

url:http://support.citrix.com/article/ctx117991

Trust: 1.5

url:http://support.citrix.com/article/ctx118183

Trust: 1.5

url:http://up2date.astaro.com/2008/08/up2date_7202_released.html

Trust: 1.5

url:http://www.isc.org/index.pl?/sw/bind/bind-security.php

Trust: 1.5

url:http://www.kb.cert.org/vuls/id/mimg-7dwr4j

Trust: 1.5

url:http://www.kb.cert.org/vuls/id/mimg-7ecl8q

Trust: 1.5

url:http://www.phys.uu.nl/~rombouts/pdnsd/changelog

Trust: 1.5

url:http://www.rtpro.yamaha.co.jp/rt/faq/security/vu800113.html

Trust: 1.5

url:http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/

Trust: 1.5

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01662368

Trust: 1.5

url:http://www.nominum.com/asset_upload_file741_2661.pdf

Trust: 1.5

url:http://rhn.redhat.com/errata/rhsa-2008-0533.html

Trust: 1.5

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1

Trust: 1.5

url:http://www.ipcop.org/index.php?name=news&file=article&sid=40

Trust: 1.4

url:http://security.gentoo.org/glsa/glsa-200812-17.xml

Trust: 1.3

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26667

Trust: 1.2

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26668

Trust: 1.2

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26669

Trust: 1.2

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26670

Trust: 1.2

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26671

Trust: 1.2

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26672

Trust: 1.2

url:http://lists.apple.com/archives/security-announce//2008/jul/msg00003.html

Trust: 1.2

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00003.html

Trust: 1.2

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00004.html

Trust: 1.2

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00005.html

Trust: 1.2

url:http://www.securityfocus.com/bid/30131

Trust: 1.2

url:http://www.securityfocus.com/archive/1/495289/100/0/threaded

Trust: 1.2

url:http://www.securityfocus.com/archive/1/495869/100/0/threaded

Trust: 1.2

url:http://www.us-cert.gov/cas/techalerts/ta08-190a.html

Trust: 1.2

url:http://www.us-cert.gov/cas/techalerts/ta08-190b.html

Trust: 1.2

url:http://www.us-cert.gov/cas/techalerts/ta08-260a.html

Trust: 1.2

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00809c2168.shtml

Trust: 1.2

url:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401

Trust: 1.2

url:http://support.apple.com/kb/ht3026

Trust: 1.2

url:http://support.apple.com/kb/ht3129

Trust: 1.2

url:http://wiki.rpath.com/wiki/advisories:rpsa-2008-0231

Trust: 1.2

url:http://wiki.rpath.com/wiki/advisories:rpsa-2010-0018

Trust: 1.2

url:http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning

Trust: 1.2

url:http://www.novell.com/support/viewcontent.do?externalid=7000912

Trust: 1.2

url:http://www.phys.uu.nl/~rombouts/pdnsd.html

Trust: 1.2

url:http://www.vmware.com/security/advisories/vmsa-2008-0014.html

Trust: 1.2

url:http://www.debian.org/security/2008/dsa-1603

Trust: 1.2

url:http://www.debian.org/security/2008/dsa-1604

Trust: 1.2

url:http://www.debian.org/security/2008/dsa-1605

Trust: 1.2

url:http://www.debian.org/security/2008/dsa-1619

Trust: 1.2

url:http://www.debian.org/security/2008/dsa-1623

Trust: 1.2

url:https://www.exploit-db.com/exploits/6122

Trust: 1.2

url:https://www.exploit-db.com/exploits/6123

Trust: 1.2

url:https://www.exploit-db.com/exploits/6130

Trust: 1.2

url:https://www.redhat.com/archives/fedora-package-announce/2008-july/msg00402.html

Trust: 1.2

url:https://www.redhat.com/archives/fedora-package-announce/2008-july/msg00458.html

Trust: 1.2

url:http://security.freebsd.org/advisories/freebsd-sa-08:06.bind.asc

Trust: 1.2

url:http://lists.grok.org.uk/pipermail/full-disclosure/2008-august/064118.html

Trust: 1.2

url:http://security.gentoo.org/glsa/glsa-200807-08.xml

Trust: 1.2

url:http://security.gentoo.org/glsa/glsa-201209-25.xml

Trust: 1.2

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01523520

Trust: 1.2

url:http://www.mandriva.com/security/advisories?name=mdvsa-2008:139

Trust: 1.2

url:http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html

Trust: 1.2

url:http://www.caughq.org/exploits/cau-ex-2008-0002.txt

Trust: 1.2

url:http://www.caughq.org/exploits/cau-ex-2008-0003.txt

Trust: 1.2

url:http://www.doxpara.com/?p=1176

Trust: 1.2

url:http://www.doxpara.com/dmk_bo2k8.ppt

Trust: 1.2

url:http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html

Trust: 1.2

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037

Trust: 1.2

url:ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2008-009.txt.asc

Trust: 1.2

url:http://www.openbsd.org/errata42.html#013_bind

Trust: 1.2

url:http://www.openbsd.org/errata43.html#004_bind

Trust: 1.2

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a12117

Trust: 1.2

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5725

Trust: 1.2

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5761

Trust: 1.2

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5917

Trust: 1.2

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9627

Trust: 1.2

url:http://www.redhat.com/support/errata/rhsa-2008-0789.html

Trust: 1.2

url:http://www.securitytracker.com/id?1020437

Trust: 1.2

url:http://www.securitytracker.com/id?1020438

Trust: 1.2

url:http://www.securitytracker.com/id?1020440

Trust: 1.2

url:http://www.securitytracker.com/id?1020448

Trust: 1.2

url:http://www.securitytracker.com/id?1020449

Trust: 1.2

url:http://www.securitytracker.com/id?1020548

Trust: 1.2

url:http://www.securitytracker.com/id?1020558

Trust: 1.2

url:http://www.securitytracker.com/id?1020560

Trust: 1.2

url:http://www.securitytracker.com/id?1020561

Trust: 1.2

url:http://www.securitytracker.com/id?1020575

Trust: 1.2

url:http://www.securitytracker.com/id?1020576

Trust: 1.2

url:http://www.securitytracker.com/id?1020577

Trust: 1.2

url:http://www.securitytracker.com/id?1020578

Trust: 1.2

url:http://www.securitytracker.com/id?1020579

Trust: 1.2

url:http://www.securitytracker.com/id?1020651

Trust: 1.2

url:http://www.securitytracker.com/id?1020653

Trust: 1.2

url:http://www.securitytracker.com/id?1020702

Trust: 1.2

url:http://www.securitytracker.com/id?1020802

Trust: 1.2

url:http://www.securitytracker.com/id?1020804

Trust: 1.2

url:http://secunia.com/advisories/30925

Trust: 1.2

url:http://secunia.com/advisories/30973

Trust: 1.2

url:http://secunia.com/advisories/30977

Trust: 1.2

url:http://secunia.com/advisories/30979

Trust: 1.2

url:http://secunia.com/advisories/30980

Trust: 1.2

url:http://secunia.com/advisories/30988

Trust: 1.2

url:http://secunia.com/advisories/30989

Trust: 1.2

url:http://secunia.com/advisories/30998

Trust: 1.2

url:http://secunia.com/advisories/31011

Trust: 1.2

url:http://secunia.com/advisories/31012

Trust: 1.2

url:http://secunia.com/advisories/31014

Trust: 1.2

url:http://secunia.com/advisories/31019

Trust: 1.2

url:http://secunia.com/advisories/31022

Trust: 1.2

url:http://secunia.com/advisories/31030

Trust: 1.2

url:http://secunia.com/advisories/31031

Trust: 1.2

url:http://secunia.com/advisories/31033

Trust: 1.2

url:http://secunia.com/advisories/31052

Trust: 1.2

url:http://secunia.com/advisories/31065

Trust: 1.2

url:http://secunia.com/advisories/31072

Trust: 1.2

url:http://secunia.com/advisories/31093

Trust: 1.2

url:http://secunia.com/advisories/31094

Trust: 1.2

url:http://secunia.com/advisories/31137

Trust: 1.2

url:http://secunia.com/advisories/31143

Trust: 1.2

url:http://secunia.com/advisories/31151

Trust: 1.2

url:http://secunia.com/advisories/31152

Trust: 1.2

url:http://secunia.com/advisories/31153

Trust: 1.2

url:http://secunia.com/advisories/31169

Trust: 1.2

url:http://secunia.com/advisories/31197

Trust: 1.2

url:http://secunia.com/advisories/31199

Trust: 1.2

url:http://secunia.com/advisories/31204

Trust: 1.2

url:http://secunia.com/advisories/31207

Trust: 1.2

url:http://secunia.com/advisories/31209

Trust: 1.2

url:http://secunia.com/advisories/31212

Trust: 1.2

url:http://secunia.com/advisories/31213

Trust: 1.2

url:http://secunia.com/advisories/31221

Trust: 1.2

url:http://secunia.com/advisories/31236

Trust: 1.2

url:http://secunia.com/advisories/31237

Trust: 1.2

url:http://secunia.com/advisories/31254

Trust: 1.2

url:http://secunia.com/advisories/31326

Trust: 1.2

url:http://secunia.com/advisories/31354

Trust: 1.2

url:http://secunia.com/advisories/31422

Trust: 1.2

url:http://secunia.com/advisories/31430

Trust: 1.2

url:http://secunia.com/advisories/31451

Trust: 1.2

url:http://secunia.com/advisories/31482

Trust: 1.2

url:http://secunia.com/advisories/31495

Trust: 1.2

url:http://secunia.com/advisories/31588

Trust: 1.2

url:http://secunia.com/advisories/31687

Trust: 1.2

url:http://secunia.com/advisories/31823

Trust: 1.2

url:http://secunia.com/advisories/31882

Trust: 1.2

url:http://secunia.com/advisories/31900

Trust: 1.2

url:http://secunia.com/advisories/33178

Trust: 1.2

url:http://secunia.com/advisories/33714

Trust: 1.2

url:http://secunia.com/advisories/33786

Trust: 1.2

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-622-1

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-627-1

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2019/references

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2023/references

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2025/references

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2029/references

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2030/references

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2050/references

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2051/references

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2052/references

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2055/references

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2092/references

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2113/references

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2114/references

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2123/references

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2139/references

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2166/references

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2195/references

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2196/references

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2197/references

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2268

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2291

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2334

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2342

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2377

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2383

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2384

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2466

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2467

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2482

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2525

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2549

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2558

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2582

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/2584

Trust: 1.2

url:http://www.vupen.com/english/advisories/2009/0297

Trust: 1.2

url:http://www.vupen.com/english/advisories/2009/0311

Trust: 1.2

url:http://www.vupen.com/english/advisories/2010/0622

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/43637

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/43334

Trust: 1.2

url:http://marc.info/?l=bugtraq&m=121630706004256&w=2

Trust: 1.1

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&id=762152

Trust: 1.1

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680

Trust: 1.1

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=121866517322103&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=123324863916385&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=141879471518471&w=2

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1447

Trust: 1.1

url:http://secunia.com/advisories/26195/

Trust: 0.9

url:http://csrc.nist.gov/publications/nistpubs/800-81/sp800-81.pdf

Trust: 0.8

url:http://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience

Trust: 0.8

url:http://tools.ietf.org/html/rfc3833

Trust: 0.8

url:http://tools.ietf.org/html/rfc2827

Trust: 0.8

url:http://tools.ietf.org/html/rfc3704

Trust: 0.8

url:http://tools.ietf.org/html/rfc3013

Trust: 0.8

url:http://tools.ietf.org/html/rfc4033

Trust: 0.8

url:http://tools.ietf.org/html/draft-ietf-tsvwg-port-randomization

Trust: 0.8

url:http://cr.yp.to/djbdns/dns_random.html

Trust: 0.8

url:http://cr.yp.to/djbdns/dns_transmit.html

Trust: 0.8

url:http://cr.yp.to/djbdns/forgery.html

Trust: 0.8

url:http://www.trusteer.com/microsoftdns

Trust: 0.8

url:http://www.trusteer.com/bind9dns

Trust: 0.8

url:http://www.trusteer.com/bind8dns

Trust: 0.8

url:http://www.sans.org/reading_room/whitepapers/dns/1567.php

Trust: 0.8

url:http://blogs.iss.net/archive/morednsnat.html

Trust: 0.8

url:https://jvn.jp/cert/jvnvu800113/

Trust: 0.8

url:http://www.cert.at/static/cert.at-0802-dns-patchanalysis.pdf

Trust: 0.8

url:http://www.isc.org/sw/bind/bind-security.php

Trust: 0.8

url:http://www.trusteer.com/docs/bind9dns.html

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23252735/index.html

Trust: 0.8

url:http://www.milw0rm.com/exploits/4266

Trust: 0.8

url:http://docs.info.apple.com/article.html?artnum=307041

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1447

Trust: 0.5

url:http://blogs.sun.com/security/entry/isrs_available_for_bind_dns

Trust: 0.3

url:http://support.apple.com/kb/ht3137

Trust: 0.3

url:http://blog.ncircle.com/blogs/sync/archives/2008/08/apple_dns_patch_fails_to_rando.html

Trust: 0.3

url:http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.5-p2

Trust: 0.3

url:http://www.isc.org/index.pl?/sw/bind/view/?release=9.4.2-p2

Trust: 0.3

url:http://www.isc.org/index.pl?/sw/bind/view/?release=9.5.0-p2

Trust: 0.3

url:http://www.bluecatnetworks.com/clientsupport/

Trust: 0.3

url:http://www.checkpoint.com

Trust: 0.3

url:http://www.tinydns.org/

Trust: 0.3

url:http://blog.metasploit.com/2008/07/on-dns-attacks-in-wild-and-journalistic.html

Trust: 0.3

url:http://www.cisco.com/web/about/security/intelligence/dns-bcp.html

Trust: 0.3

url:http://www.securebits.org/dnsmre.html

Trust: 0.3

url:http://www.f5.com/products/big-ip/

Trust: 0.3

url:http://www.f5.com/

Trust: 0.3

url:http://support.citrix.com/article/ctx116762

Trust: 0.3

url:http://www.sec-consult.com/files/whitepaper-dns-node-redelegation.pdf

Trust: 0.3

url:http://www.us-cert.gov/current/index.html#internet_system_consortium_releases_bind

Trust: 0.3

url:http://www.ipcop.org/

Trust: 0.3

url:http://www.microsoft.com/windows/default.mspx

Trust: 0.3

url:http://www.openbsd.org/errata42.html

Trust: 0.3

url:http://www.openbsd.org/errata43.html

Trust: 0.3

url:http://www.ingate.com/relnote-464.php

Trust: 0.3

url:http://darkoz.com/?p=15

Trust: 0.3

url:http://www.bluecatnetworks.com/

Trust: 0.3

url:http://f5.com/products/firepass/

Trust: 0.3

url:http://www.vmware.com

Trust: 0.3

url:http://www.windriver.com/

Trust: 0.3

url:http://www.zonealarm.com/

Trust: 0.3

url:/archive/1/500540

Trust: 0.3

url:/archive/1/495304

Trust: 0.3

url:/archive/1/494716

Trust: 0.3

url:/archive/1/494055

Trust: 0.3

url:/archive/1/495034

Trust: 0.3

url:/archive/1/494305

Trust: 0.3

url:/archive/1/494493

Trust: 0.3

url:/archive/1/494108

Trust: 0.3

url:/archive/1/494818

Trust: 0.3

url:/archive/1/495212

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2008-288.htm

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml

Trust: 0.3

url:http://hypersonic.bluecoat.com/support/securityadvisories/dns_cache_poisoning

Trust: 0.3

url:http://www13.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c01660723

Trust: 0.3

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04530690

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg1iz26670

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/mimg-7dwr4z

Trust: 0.3

url:http://www.microsoft.com/technet/security/advisory/956187.mspx

Trust: 0.3

url:http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx

Trust: 0.3

url:http://www1.alcatel-lucent.com/psirt/statements/2008003/dnscache.htm

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/mapg-7g7nuc

Trust: 0.3

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&documentoid=762152&poid=

Trust: 0.3

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&id=751322

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2008-0789.html

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-240048-1

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-245206-1

Trust: 0.3

url:http://www.novell.com/support/viewcontent.do?externalid=7000912&sliceid=1

Trust: 0.3

url:http://up2date.astaro.com/2008/09/up2date_6314_released.html

Trust: 0.3

url:http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&id=4527

Trust: 0.3

url:http://bugs.gentoo.org.

Trust: 0.3

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.3

url:http://security.gentoo.org/

Trust: 0.3

url:http://www.itrc.hp.com/service/cki/secbullarchive.do

Trust: 0.3

url:http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&langcode=useng&jumpid=in_sc-gen__driveritrc&topiccode=itrc

Trust: 0.3

url:https://www.hp.com/go/swa

Trust: 0.3

url:http://h30046.www3.hp.com/subsignin.php

Trust: 0.3

url:http://packages.debian.org/<pkg>

Trust: 0.3

url:http://security.debian.org/

Trust: 0.3

url:http://www.debian.org/security/faq

Trust: 0.3

url:http://www.debian.org/security/

Trust: 0.3

url:http://software.hp.com

Trust: 0.2

url:http://secunia.com/

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&amp;id=762152

Trust: 0.1

url:http://www.ipcop.org/index.php?name=news&amp;file=article&amp;sid=40

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=123324863916385&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=141879471518471&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=121866517322103&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=121630706004256&amp;w=2

Trust: 0.1

url:http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.539239

Trust: 0.1

url:http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.452680

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/331.html

Trust: 0.1

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123

Trust: 0.1

url:https://usn.ubuntu.com/622-1/

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/6122/

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_i386.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4194

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-200901-03.xml

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4194

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4.dsc

Trust: 0.1

url:http://kb.vmware.com/kb/1006356

Trust: 0.1

url:http://kb.vmware.com/kb/1005896

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5503

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3698

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1807

Trust: 0.1

url:http://kb.vmware.com/kb/1055

Trust: 0.1

url:http://download3.vmware.com/software/esx/esx350-200806203-ug.zip

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5438

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3696

Trust: 0.1

url:http://kb.vmware.com/kb/1004824

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1005117.tgz

Trust: 0.1

url:http://www.vmware.com/support/server/doc/releasenotes_server.html

Trust: 0.1

url:http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1004824.tgz

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3696

Trust: 0.1

url:http://www.vmware.com/support/policies/eos_vi.html

Trust: 0.1

url:http://kb.vmware.com/kb/1005111

Trust: 0.1

url:http://kb.vmware.com/kb/1004823

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1005108.tgz

Trust: 0.1

url:http://kb.vmware.com/kb/1005113

Trust: 0.1

url:http://www.vmware.com/download/player/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3697

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3698

Trust: 0.1

url:http://www.vmware.com/security

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5269

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1808

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx303-200808406-sg.zip

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1005114.tgz

Trust: 0.1

url:http://www.vmware.com/download/ws/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3691

Trust: 0.1

url:http://www.vmware.com/support/policies/eos.html

Trust: 0.1

url:http://kb.vmware.com/kb/1005114

Trust: 0.1

url:http://www.vmware.com/download/server/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3693

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx303-200808403-sg.zip

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1807

Trust: 0.1

url:http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1806

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3694

Trust: 0.1

url:http://kb.vmware.com/kb/1005112

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3695

Trust: 0.1

url:http://www.vmware.com/support/player/doc/releasenotes_player.html

Trust: 0.1

url:http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html

Trust: 0.1

url:http://www.vmware.com/download/ws/ws5.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3692

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3697

Trust: 0.1

url:http://kb.vmware.com/kb/1005109

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3695

Trust: 0.1

url:http://kb.vmware.com/kb/1005108

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1808

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx303-200808404-sg.zip

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2101

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1806

Trust: 0.1

url:http://kb.vmware.com/kb/1006357

Trust: 0.1

url:http://www.vmware.com/support/policies/security_response.html

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1005113.tgz

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2101

Trust: 0.1

url:http://kb.vmware.com/kb/1006034

Trust: 0.1

url:http://kb.vmware.com/kb/1006035

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1006356.tgz

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5503

Trust: 0.1

url:http://kb.vmware.com/kb/1005117

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3693

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1005112.tgz

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5269

Trust: 0.1

url:http://www.vmware.com/download/ace/

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1005109.tgz

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3694

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1004823.tgz

Trust: 0.1

url:http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1005111.tgz

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3691

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5438

Trust: 0.1

url:http://www.vmware.com/support/player2/doc/releasenotes_player2.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3692

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2376

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2662

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2726

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2376

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3655

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3905

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3790

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2663

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3790

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2664

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2662

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3657

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3656

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2663

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2664

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3655

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3905

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2726

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2725

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2725

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3656

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3657

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-200809-02.xml

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3350

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3350

Trust: 0.1

url:http://secunia.com/advisories/31430/

Trust: 0.1

url:http://pinguar.org

Trust: 0.1

url:http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby

Trust: 0.1

url:http://itrc.hp.com

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch1.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch1_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch1.diff.gz

Trust: 0.1

url:http://secunia.com/product/2536/

Trust: 0.1

url:http://rhn.redhat.com/errata/rhsa-2007-0740.html

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/product/2535/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/13653/

Trust: 0.1

url:http://secunia.com/product/48/

Trust: 0.1

url:http://rhn.redhat.com

Trust: 0.1

url:http://secunia.com/product/13651/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/4669/

Trust: 0.1

url:http://secunia.com/product/4668/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/13652/

Trust: 0.1

url:http://secunia.com/product/1326/

Trust: 0.1

url:http://secunia.com/advisories/26152/

Trust: 0.1

url:http://secunia.com/product/1306/

Trust: 0.1

url:http://secunia.com/product/4670/

Trust: 0.1

url:http://secunia.com/product/2534/

Trust: 0.1

url:http://secunia.com/product/1044/

Trust: 0.1

sources: CERT/CC: VU#800113 // CERT/CC: VU#252735 // VULHUB: VHN-31572 // VULMON: CVE-2008-1447 // BID: 30131 // PACKETSTORM: 68412 // PACKETSTORM: 73732 // PACKETSTORM: 68288 // PACKETSTORM: 68691 // PACKETSTORM: 69536 // PACKETSTORM: 68360 // PACKETSTORM: 73060 // PACKETSTORM: 69643 // PACKETSTORM: 69021 // PACKETSTORM: 96747 // PACKETSTORM: 68038 // PACKETSTORM: 68546 // PACKETSTORM: 58035 // NVD: CVE-2008-1447

CREDITS

Dan Kaminsky of IOActive

Trust: 0.3

sources: BID: 30131

SOURCES

db:CERT/CCid:VU#800113
db:CERT/CCid:VU#252735
db:VULHUBid:VHN-31572
db:VULMONid:CVE-2008-1447
db:BIDid:30131
db:PACKETSTORMid:68412
db:PACKETSTORMid:73732
db:PACKETSTORMid:68288
db:PACKETSTORMid:68691
db:PACKETSTORMid:69536
db:PACKETSTORMid:68360
db:PACKETSTORMid:73060
db:PACKETSTORMid:69643
db:PACKETSTORMid:69021
db:PACKETSTORMid:96747
db:PACKETSTORMid:68038
db:PACKETSTORMid:68546
db:PACKETSTORMid:58035
db:NVDid:CVE-2008-1447

LAST UPDATE DATE

2025-12-22T21:36:52.138000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#800113date:2014-04-14T00:00:00
db:CERT/CCid:VU#252735date:2008-08-06T00:00:00
db:VULHUBid:VHN-31572date:2020-03-24T00:00:00
db:VULMONid:CVE-2008-1447date:2020-03-24T00:00:00
db:BIDid:30131date:2015-04-13T21:35:00
db:NVDid:CVE-2008-1447date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#800113date:2008-07-08T00:00:00
db:CERT/CCid:VU#252735date:2007-07-27T00:00:00
db:VULHUBid:VHN-31572date:2008-07-08T00:00:00
db:VULMONid:CVE-2008-1447date:2008-07-08T00:00:00
db:BIDid:30131date:2008-07-08T00:00:00
db:PACKETSTORMid:68412date:2008-07-22T18:01:41
db:PACKETSTORMid:73732date:2009-01-12T19:16:04
db:PACKETSTORMid:68288date:2008-07-17T19:16:48
db:PACKETSTORMid:68691date:2008-07-31T22:22:45
db:PACKETSTORMid:69536date:2008-08-31T23:44:00
db:PACKETSTORMid:68360date:2008-07-21T19:44:10
db:PACKETSTORMid:73060date:2008-12-16T21:29:31
db:PACKETSTORMid:69643date:2008-09-04T22:22:48
db:PACKETSTORMid:69021date:2008-08-13T04:21:24
db:PACKETSTORMid:96747date:2010-12-16T23:46:15
db:PACKETSTORMid:68038date:2008-07-10T06:24:58
db:PACKETSTORMid:68546date:2008-07-28T15:27:39
db:PACKETSTORMid:58035date:2007-07-26T04:26:32
db:NVDid:CVE-2008-1447date:2008-07-08T23:41:00