Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-1447

Опубликовано: 08 июл. 2008
Источник: ubuntu
Приоритет: high
CVSS2: 5
CVSS3: 6.8

Описание

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."

РелизСтатусПримечание
dapper

released

1:9.3.2-2ubuntu1.5
devel

released

1:9.5.0.dfsg.P1-2~build1
feisty

released

1:9.3.4-2ubuntu2.3
gutsy

released

1:9.4.1-P1-3ubuntu2
hardy

released

1:9.4.2-10ubuntu0.1
intrepid

released

1:9.5.0.dfsg.P1-2~build1
jaunty

released

1:9.5.0.dfsg.P1-2~build1
karmic

released

1:9.5.0.dfsg.P1-2~build1
upstream

released

Показывать по

РелизСтатусПримечание
dapper

ignored

end of life
devel

released

2.43-1ubuntu1
feisty

ignored

end of life, was needed
gutsy

ignored

end of life, was needed
hardy

released

2.41-2ubuntu2.1
intrepid

released

2.43-1ubuntu1
jaunty

released

2.43-1ubuntu1
karmic

released

2.43-1ubuntu1
upstream

released

2.43-1

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

feisty

DNE

gutsy

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

not-affected

upstream

not-affected

Показывать по

РелизСтатусПримечание
dapper

not-affected

devel

DNE

feisty

ignored

end of life, was needed
gutsy

ignored

end of life, was needed
hardy

not-affected

intrepid

not-affected

jaunty

not-affected

karmic

DNE

upstream

not-affected

Показывать по

РелизСтатусПримечание
dapper

released

2.3.0-5ubuntu1.2
devel

not-affected

feisty

released

2.3.0-5.1ubuntu2.2
gutsy

released

2.3.1-1ubuntu0.2
hardy

released

2.3.1-2ubuntu0.2
intrepid

not-affected

2.3.3-2
jaunty

not-affected

karmic

not-affected

upstream

released

2.3.3-1

Показывать по

5 Medium

CVSS2

6.8 Medium

CVSS3

Связанные уязвимости

redhat
почти 17 лет назад

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."

CVSS3: 6.8
nvd
почти 17 лет назад

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."

CVSS3: 6.8
debian
почти 17 лет назад

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, ...

CVSS3: 6.8
github
около 3 лет назад

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."

oracle-oval
почти 17 лет назад

ELSA-2008-0789: dnsmasq security update (MODERATE)

5 Medium

CVSS2

6.8 Medium

CVSS3

Уязвимость CVE-2008-1447