Lucene search

K
nvd[email protected]NVD:CVE-2008-1447
HistoryJul 08, 2008 - 11:41 p.m.

CVE-2008-1447

2008-07-0823:41:00
CWE-331
web.nvd.nist.gov

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N

6.3 Medium

AI Score

Confidence

High

0.133 Low

EPSS

Percentile

95.6%

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka “DNS Insufficient Socket Entropy Vulnerability” or “the Kaminsky bug.”

Affected configurations

NVD
Node
canonicalubuntu_linuxMatch6.06lts
OR
canonicalubuntu_linuxMatch7.04
OR
canonicalubuntu_linuxMatch7.10
OR
canonicalubuntu_linuxMatch8.04lts
OR
ciscoiosMatch12.0
OR
debiandebian_linuxMatch4.0
OR
microsoftwindows_2000sp4
OR
microsoftwindows_server_2003Match-x64
OR
microsoftwindows_server_2003Match-sp1compute_clusteritanium
OR
microsoftwindows_server_2003Match-sp1datacenteritanium
OR
microsoftwindows_server_2003Match-sp1enterpriseitanium
OR
microsoftwindows_server_2003Match-sp1standarditanium
OR
microsoftwindows_server_2003Match-sp1storageitanium
OR
microsoftwindows_server_2003Match-sp2compute_clusteritanium
OR
microsoftwindows_server_2003Match-sp2compute_clusterx64
OR
microsoftwindows_server_2003Match-sp2datacenteritanium
OR
microsoftwindows_server_2003Match-sp2datacenterx64
OR
microsoftwindows_server_2003Match-sp2enterpriseitanium
OR
microsoftwindows_server_2003Match-sp2enterprisex64
OR
microsoftwindows_server_2003Match-sp2standarditanium
OR
microsoftwindows_server_2003Match-sp2standardx64
OR
microsoftwindows_server_2003Match-sp2storageitanium
OR
microsoftwindows_server_2003Match-sp2storagex64
OR
microsoftwindows_xpsp2
OR
microsoftwindows_xpMatch--professionalx64
OR
microsoftwindows_xpMatch-sp3
OR
redhatenterprise_linuxMatch2.1as
OR
redhatenterprise_linuxMatch2.1es
OR
redhatenterprise_linuxMatch2.1ws
OR
redhatenterprise_linuxMatch5client
OR
redhatenterprise_linuxMatch5client_workstation
OR
redhatenterprise_linuxMatch5.0
AND
iscbindMatch4
OR
iscbindMatch8
OR
iscbindMatch9.2.9

References

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N

6.3 Medium

AI Score

Confidence

High

0.133 Low

EPSS

Percentile

95.6%