Summary |
The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug." |
oval
via4
|
accepted | 2015-04-20T04:00:16.171-04:00 | class | vulnerability | contributors | name | K, Balamurugan | organization | Hewlett-Packard |
name | Sushant Kumar Singh | organization | Hewlett-Packard |
name | Sushant Kumar Singh | organization | Hewlett-Packard |
name | Prashant Kumar | organization | Hewlett-Packard |
name | Mike Cokus | organization | The MITRE Corporation |
| description | The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug." | family | unix | id | oval:org.mitre.oval:def:12117 | status | accepted | submitted | 2011-02-01T11:17:11.000-05:00 | title | HP-UX Running BIND, Remote DNS Cache Poisoning | version | 50 |
accepted | 2011-11-14T04:00:45.190-05:00 | class | vulnerability | contributors | name | Jeff Ito | organization | Secure Elements, Inc. |
name | Chandan S | organization | SecPod Technologies |
| definition_extensions | comment | Microsoft Windows 2000 SP4 or later is installed | oval | oval:org.mitre.oval:def:229 |
comment | Microsoft Windows XP (x86) SP2 is installed | oval | oval:org.mitre.oval:def:754 |
comment | Microsoft Windows XP (x86) SP3 is installed | oval | oval:org.mitre.oval:def:5631 |
comment | Microsoft Windows XP Professional x64 Edition SP1 is installed | oval | oval:org.mitre.oval:def:720 |
comment | Microsoft Windows XP x64 Edition SP2 is installed | oval | oval:org.mitre.oval:def:4193 |
comment | Microsoft Windows Server 2003 SP1 (x86) is installed | oval | oval:org.mitre.oval:def:565 |
comment | Microsoft Windows Server 2003 (x64) is installed | oval | oval:org.mitre.oval:def:730 |
comment | Microsoft Windows Server 2003 SP1 for Itanium is installed | oval | oval:org.mitre.oval:def:1205 |
comment | Microsoft Windows Server 2003 SP2 (x86) is installed | oval | oval:org.mitre.oval:def:1935 |
comment | Microsoft Windows Server 2003 SP2 (x64) is installed | oval | oval:org.mitre.oval:def:2161 |
comment | Microsoft Windows Server 2003 (ia64) SP2 is installed | oval | oval:org.mitre.oval:def:1442 |
| description | The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug." | family | windows | id | oval:org.mitre.oval:def:5725 | status | accepted | submitted | 2008-07-08T14:18:00 | title | DNS Insufficient Socket Entropy Vulnerability | version | 74 |
accepted | 2015-04-20T04:02:27.378-04:00 | class | vulnerability | contributors | name | Michael Wood | organization | Hewlett-Packard |
name | Sushant Kumar Singh | organization | Hewlett-Packard |
name | Sushant Kumar Singh | organization | Hewlett-Packard |
name | Prashant Kumar | organization | Hewlett-Packard |
name | Mike Cokus | organization | The MITRE Corporation |
| description | The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug." | family | unix | id | oval:org.mitre.oval:def:5761 | status | accepted | submitted | 2008-08-06T17:38:46.000-04:00 | title | HP-UX Running BIND, Remote DNS Cache Poisoning | version | 47 |
accepted | 2009-10-05T04:00:05.186-04:00 | class | vulnerability | contributors | name | Pai Peng | organization | Hewlett-Packard |
| definition_extensions | comment | Solaris 8 (SPARC) is installed | oval | oval:org.mitre.oval:def:1539 |
comment | Solaris 9 (SPARC) is installed | oval | oval:org.mitre.oval:def:1457 |
comment | Solaris 10 (SPARC) is installed | oval | oval:org.mitre.oval:def:1440 |
comment | Solaris 8 (x86) is installed | oval | oval:org.mitre.oval:def:2059 |
comment | Solaris 9 (x86) is installed | oval | oval:org.mitre.oval:def:1683 |
comment | Solaris 10 (x86) is installed | oval | oval:org.mitre.oval:def:1926 |
| description | The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug." | family | unix | id | oval:org.mitre.oval:def:5917 | status | accepted | submitted | 2009-08-25T16:38:09.000-04:00 | title | Security Vulnerability in the DNS Protocol May Lead to DNS Cache Poisoning | version | 34 |
accepted | 2013-04-29T04:20:49.236-04:00 | class | vulnerability | contributors | name | Aharon Chernin | organization | SCAP.com, LLC |
name | Dragos Prisaca | organization | G2, Inc. |
| definition_extensions | comment | The operating system installed on the system is Red Hat Enterprise Linux 3 | oval | oval:org.mitre.oval:def:11782 |
comment | CentOS Linux 3.x | oval | oval:org.mitre.oval:def:16651 |
comment | The operating system installed on the system is Red Hat Enterprise Linux 4 | oval | oval:org.mitre.oval:def:11831 |
comment | CentOS Linux 4.x | oval | oval:org.mitre.oval:def:16636 |
comment | Oracle Linux 4.x | oval | oval:org.mitre.oval:def:15990 |
comment | The operating system installed on the system is Red Hat Enterprise Linux 5 | oval | oval:org.mitre.oval:def:11414 |
comment | The operating system installed on the system is CentOS Linux 5.x | oval | oval:org.mitre.oval:def:15802 |
comment | Oracle Linux 5.x | oval | oval:org.mitre.oval:def:15459 |
| description | The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug." | family | unix | id | oval:org.mitre.oval:def:9627 | status | accepted | submitted | 2010-07-09T03:56:16-04:00 | title | The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug." | version | 31 |
|
refmap
via4
|
aixapar | - IZ26667
- IZ26668
- IZ26669
- IZ26670
- IZ26671
- IZ26672
| apple | - APPLE-SA-2008-07-31
- APPLE-SA-2008-09-09
- APPLE-SA-2008-09-12
- APPLE-SA-2008-09-15
| bid | 30131 | bugtraq | - 20080808 New paper: An Illustrated Guide to the Kaminsky DNS Vulnerability
- 20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.
| cert | - TA08-190A
- TA08-190B
- TA08-260A
| cert-vn | VU#800113 | cisco | 20080708 Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks | confirm | | debian | - DSA-1603
- DSA-1604
- DSA-1605
- DSA-1619
- DSA-1623
| exploit-db | | fedora | - FEDORA-2008-6256
- FEDORA-2008-6281
| freebsd | FreeBSD-SA-08:06 | fulldisc | 20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues. | gentoo | - GLSA-200807-08
- GLSA-200812-17
- GLSA-201209-25
| hp | - HPSBMP02404
- HPSBNS02405
- HPSBOV02357
- HPSBOV03226
- HPSBTU02358
- HPSBUX02351
- SSRT071449
- SSRT080058
- SSRT090014
- SSRT101004
| mandriva | MDVSA-2008:139 | misc | | netbsd | NetBSD-SA2008-009 | openbsd | - [4.2] 013: SECURITY FIX: July 23, 2008
- [4.3] 004: SECURITY FIX: July 23, 2008
| sectrack | - 1020437
- 1020438
- 1020440
- 1020448
- 1020449
- 1020548
- 1020558
- 1020560
- 1020561
- 1020575
- 1020576
- 1020577
- 1020578
- 1020579
- 1020651
- 1020653
- 1020702
- 1020802
- 1020804
| secunia | - 30925
- 30973
- 30977
- 30979
- 30980
- 30988
- 30989
- 30998
- 31011
- 31012
- 31014
- 31019
- 31022
- 31030
- 31031
- 31033
- 31052
- 31065
- 31072
- 31093
- 31094
- 31137
- 31143
- 31151
- 31152
- 31153
- 31169
- 31197
- 31199
- 31204
- 31207
- 31209
- 31212
- 31213
- 31221
- 31236
- 31237
- 31254
- 31326
- 31354
- 31422
- 31430
- 31451
- 31482
- 31495
- 31588
- 31687
- 31823
- 31882
- 31900
- 33178
- 33714
- 33786
| slackware | - SSA:2008-191
- SSA:2008-205-01
| sunalert | | suse | - SUSE-SA:2008:033
- SUSE-SR:2008:017
| ubuntu | | vupen | - ADV-2008-2019
- ADV-2008-2023
- ADV-2008-2025
- ADV-2008-2029
- ADV-2008-2030
- ADV-2008-2050
- ADV-2008-2051
- ADV-2008-2052
- ADV-2008-2055
- ADV-2008-2092
- ADV-2008-2113
- ADV-2008-2114
- ADV-2008-2123
- ADV-2008-2139
- ADV-2008-2166
- ADV-2008-2195
- ADV-2008-2196
- ADV-2008-2197
- ADV-2008-2268
- ADV-2008-2291
- ADV-2008-2334
- ADV-2008-2342
- ADV-2008-2377
- ADV-2008-2383
- ADV-2008-2384
- ADV-2008-2466
- ADV-2008-2467
- ADV-2008-2482
- ADV-2008-2525
- ADV-2008-2549
- ADV-2008-2558
- ADV-2008-2582
- ADV-2008-2584
- ADV-2009-0297
- ADV-2009-0311
- ADV-2010-0622
| xf | - cisco-multiple-dns-cache-poisoning(43637)
- win-dns-client-server-spoofing(43334)
|
|