CVE-2008-1447

Scores

EPSS

0.867high86.7%
0%20%40%60%80%100%

Percentile: 86.7%

CVSS

6.8medium3.x
0246810

CVSS Score: 6.8/10

All CVSS Scores

CVSS 3.x
6.8

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N

CVSS 2.0
5.0

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Description

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka “DNS Insufficient Socket Entropy Vulnerability” or “the Kaminsky bug.”

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-331

Exploits

Exploit ID: 6122

Source: exploitdb

URL: https://www.exploit-db.com/exploits/6122

Exploit ID: 6123

Source: exploitdb

URL: https://www.exploit-db.com/exploits/6123

Exploit ID: 6130

Source: exploitdb

URL: https://www.exploit-db.com/exploits/6130

Recommendations

Source: nvd

All BIND users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=net-dns/bind-9.4.2_p1”

Note: In order to utilize the query port randomization to mitigate the
weakness, you need to make sure that your network setup allows the DNS
server to use random source ports for query and that you have not set a
fixed query port via the “query-source port” directive in the BIND
configuration.

URL: http://security.gentoo.org/glsa/glsa-200807-08.xml

Source: nvd

Before applying this update, make sure that all previously-releasederrata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available athttp://kbase.redhat.com/faq/FAQ_58_10188

URL: http://rhn.redhat.com/errata/RHSA-2008-0533.html

Vulnerable Software (22)

Type: Configuration

Product: adns

Operating System: debian

Trait:
{  "fixed": "1.4-2"}

Source: debian

Type: Configuration

Product: bind

Operating System: rhel 2.1

Trait:
{  "fixed": "9.2.1-10.el2"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel 3

Trait:
{  "fixed": "9.2.4-22.el3"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel 4

Trait:
{  "fixed": "9.2.4-28.0.1.el4"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel 5

Trait:
{  "fixed": "9.3.4-6.0.2.P1.el5_2"}

Source: redhat

Type: Configuration

Product: bind9

Operating System: ubuntu hardy 8.04

Trait:
{  "fixed": "1:9.4.2-10ubuntu0.1"}

Source: ubuntu

Type: Configuration

Product: bind9

Operating System: debian

Trait:
{  "fixed": "1:9.5.0.dfsg-5"}

Source: debian

Type: Configuration

Product: dnsmasq

Operating System: rhel 5

Trait:
{  "fixed": "2.45-1.el5_2.1"}

Source: redhat

Type: Configuration

Product: dnsmasq

Operating System: ubuntu hardy 8.04

Trait:
{  "fixed": "2.41-2ubuntu2.1"}

Source: ubuntu

Type: Configuration

Product: dnsmasq

Operating System: debian

Trait:
{  "fixed": "2.43-1"}

Source: debian

Type: Configuration

Product: dnspython

Operating System: debian

Trait:
{  "fixed": "1.7.1-1"}

Source: debian

Type: Configuration

Product: glibc

Operating System: ubuntu hardy 8.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: libnet-dns-perl

Operating System: debian

Trait:
{  "fixed": "0.63-2"}

Source: debian

Type: Configuration

Product: pdnsd

Operating System: debian

Trait:
{  "fixed": "1.2.6-par-11"}

Source: debian

Type: Configuration

Product: python-dns

Operating System: ubuntu hardy 8.04

Trait:
{  "fixed": "2.3.1-2ubuntu0.2"}

Source: ubuntu

Type: Configuration

Product: python-dns

Operating System: debian

Trait:
{  "fixed": "2.3.1-5"}

Source: debian

Type: Configuration

Product: refpolicy

Operating System: debian

Trait:
{  "fixed": "2:0.0.20080702-1"}

Source: debian

Type: Configuration

Product: ruby1.9

Operating System: debian

Trait:
{  "fixed": "1.9.0.2-6"}

Source: debian

Type: Configuration

Product: selinux-policy

Operating System: rhel 5

Trait:
{  "fixed": "2.4.6-137.1.el5_2"}

Source: redhat

Type: Configuration

Product: selinux-policy-targeted

Operating System: rhel 4

Trait:
{  "fixed": "1.17.30-2.150.el4"}

Source: redhat