6.8

CVE-2008-1447

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
IscBind Version4
   CanonicalUbuntu Linux Version6.06 SwEditionlts
   CanonicalUbuntu Linux Version7.04
   CanonicalUbuntu Linux Version7.10
   CanonicalUbuntu Linux Version8.04 SwEditionlts
   CiscoIos Version12.0
   DebianDebian Linux Version4.0
   MicrosoftWindows 2000 Updatesp4
   MicrosoftWindows Server 2003 Version- HwPlatformx64
   MicrosoftWindows Server 2003 Version- Updatesp1 SwEditioncompute_cluster HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp1 SwEditiondatacenter HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp1 SwEditionenterprise HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp1 SwEditionstandard HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp1 SwEditionstorage HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditioncompute_cluster HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditioncompute_cluster HwPlatformx64
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditiondatacenter HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditiondatacenter HwPlatformx64
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditionenterprise HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditionenterprise HwPlatformx64
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditionstandard HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditionstandard HwPlatformx64
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditionstorage HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditionstorage HwPlatformx64
   MicrosoftWindows Xp Updatesp2
   MicrosoftWindows Xp Version- Update- SwEditionprofessional HwPlatformx64
   MicrosoftWindows Xp Version- Updatesp3
   RedhatEnterprise Linux Version2.1 Editionas
   RedhatEnterprise Linux Version2.1 Editiones
   RedhatEnterprise Linux Version2.1 Editionws
   RedhatEnterprise Linux Version5 Editionclient
   RedhatEnterprise Linux Version5 Editionclient_workstation
   RedhatEnterprise Linux Version5.0
IscBind Version8
   CanonicalUbuntu Linux Version6.06 SwEditionlts
   CanonicalUbuntu Linux Version7.04
   CanonicalUbuntu Linux Version7.10
   CanonicalUbuntu Linux Version8.04 SwEditionlts
   CiscoIos Version12.0
   DebianDebian Linux Version4.0
   MicrosoftWindows 2000 Updatesp4
   MicrosoftWindows Server 2003 Version- HwPlatformx64
   MicrosoftWindows Server 2003 Version- Updatesp1 SwEditioncompute_cluster HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp1 SwEditiondatacenter HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp1 SwEditionenterprise HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp1 SwEditionstandard HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp1 SwEditionstorage HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditioncompute_cluster HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditioncompute_cluster HwPlatformx64
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditiondatacenter HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditiondatacenter HwPlatformx64
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditionenterprise HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditionenterprise HwPlatformx64
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditionstandard HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditionstandard HwPlatformx64
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditionstorage HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditionstorage HwPlatformx64
   MicrosoftWindows Xp Updatesp2
   MicrosoftWindows Xp Version- Update- SwEditionprofessional HwPlatformx64
   MicrosoftWindows Xp Version- Updatesp3
   RedhatEnterprise Linux Version2.1 Editionas
   RedhatEnterprise Linux Version2.1 Editiones
   RedhatEnterprise Linux Version2.1 Editionws
   RedhatEnterprise Linux Version5 Editionclient
   RedhatEnterprise Linux Version5 Editionclient_workstation
   RedhatEnterprise Linux Version5.0
IscBind Version9.2.9
   CanonicalUbuntu Linux Version6.06 SwEditionlts
   CanonicalUbuntu Linux Version7.04
   CanonicalUbuntu Linux Version7.10
   CanonicalUbuntu Linux Version8.04 SwEditionlts
   CiscoIos Version12.0
   DebianDebian Linux Version4.0
   MicrosoftWindows 2000 Updatesp4
   MicrosoftWindows Server 2003 Version- HwPlatformx64
   MicrosoftWindows Server 2003 Version- Updatesp1 SwEditioncompute_cluster HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp1 SwEditiondatacenter HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp1 SwEditionenterprise HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp1 SwEditionstandard HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp1 SwEditionstorage HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditioncompute_cluster HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditioncompute_cluster HwPlatformx64
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditiondatacenter HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditiondatacenter HwPlatformx64
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditionenterprise HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditionenterprise HwPlatformx64
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditionstandard HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditionstandard HwPlatformx64
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditionstorage HwPlatformitanium
   MicrosoftWindows Server 2003 Version- Updatesp2 SwEditionstorage HwPlatformx64
   MicrosoftWindows Xp Updatesp2
   MicrosoftWindows Xp Version- Update- SwEditionprofessional HwPlatformx64
   MicrosoftWindows Xp Version- Updatesp3
   RedhatEnterprise Linux Version2.1 Editionas
   RedhatEnterprise Linux Version2.1 Editiones
   RedhatEnterprise Linux Version2.1 Editionws
   RedhatEnterprise Linux Version5 Editionclient
   RedhatEnterprise Linux Version5 Editionclient_workstation
   RedhatEnterprise Linux Version5.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 85.78% 0.994
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.8 2.2 4
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:P/A:N
CWE-331 Insufficient Entropy

The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.

http://www.us-cert.gov/cas/techalerts/TA08-260A.html
Third Party Advisory
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA08-190A.html
Third Party Advisory
US Government Resource
http://secunia.com/advisories/30988
Third Party Advisory
Vendor Advisory
http://www.doxpara.com/?p=1176
Third Party Advisory
http://www.kb.cert.org/vuls/id/800113
Third Party Advisory
US Government Resource
http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
Third Party Advisory
US Government Resource
http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
Third Party Advisory
US Government Resource
http://www.securityfocus.com/bid/30131
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020437
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020438
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020440
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020448
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020449
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020548
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020558
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020560
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020561
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020575
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020576
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020577
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020578
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020579
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020651
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020653
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020702
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020802
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020804
Third Party Advisory
VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-190B.html
Third Party Advisory
US Government Resource
https://www.exploit-db.com/exploits/6122
Third Party Advisory
VDB Entry
https://www.exploit-db.com/exploits/6123
Third Party Advisory
VDB Entry
https://www.exploit-db.com/exploits/6130
Third Party Advisory
VDB Entry