{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2008-07-08T00:00:00.000Z","descriptions":[{"lang":"en","value":"The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\""}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-12T19:57:01.000Z","orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft"},"references":[{"name":"1020438","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020438"},{"name":"FEDORA-2008-6256","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html"},{"name":"SUSE-SR:2008:017","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"},{"name":"VU#800113","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/800113"},{"name":"31137","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31137"},{"name":"31430","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31430"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.kb.cert.org/vuls/id/MIMG-7DWR4J"},{"name":"31169","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31169"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.phys.uu.nl/~rombouts/pdnsd.html"},{"name":"1020702","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020702"},{"name":"GLSA-201209-25","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"name":"ADV-2008-2052","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2052/references"},{"name":"1020561","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020561"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html"},{"name":"HPSBOV03226","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2"},{"name":"1020578","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020578"},{"name":"FreeBSD-SA-08:06","tags":["vendor-advisory","x_refsource_FREEBSD"],"url":"http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc"},{"name":"oval:org.mitre.oval:def:9627","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627"},{"name":"1020802","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020802"},{"name":"HPSBMP02404","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=123324863916385&w=2"},{"name":"30131","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/30131"},{"name":"[4.2] 013: SECURITY FIX: July 23, 2008","tags":["vendor-advisory","x_refsource_OPENBSD"],"url":"http://www.openbsd.org/errata42.html#013_bind"},{"name":"31236","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31236"},{"name":"APPLE-SA-2008-09-15","tags":["vendor-advisory","x_refsource_APPLE"],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"},{"name":"1020651","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020651"},{"name":"1020437","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020437"},{"name":"31209","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31209"},{"name":"31012","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31012"},{"name":"31151","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31151"},{"name":"ADV-2008-2050","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2050/references"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.citrix.com/article/CTX117991"},{"name":"SSRT101004","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2"},{"name":"31237","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31237"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog"},{"name":"APPLE-SA-2008-07-31","tags":["vendor-advisory","x_refsource_APPLE"],"url":"http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"},{"name":"win-dns-client-server-spoofing(43334)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"},{"name":"31495","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31495"},{"name":"6130","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/6130"},{"name":"20080708 Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks","tags":["vendor-advisory","x_refsource_CISCO"],"url":"http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml"},{"name":"1020579","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020579"},{"tags":["x_refsource_MISC"],"url":"http://www.nominum.com/asset_upload_file741_2661.pdf"},{"name":"1020653","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020653"},{"name":"30998","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/30998"},{"name":"DSA-1603","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2008/dsa-1603"},{"name":"ADV-2008-2525","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2525"},{"name":"SUSE-SA:2008:033","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"},{"name":"31094","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31094"},{"name":"IZ26668","tags":["vendor-advisory","x_refsource_AIXAPAR"],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26668"},{"name":"31687","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31687"},{"name":"ADV-2008-2025","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2025/references"},{"name":"239392","tags":["vendor-advisory","x_refsource_SUNALERT"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"},{"name":"TA08-260A","tags":["third-party-advisory","x_refsource_CERT"],"url":"http://www.us-cert.gov/cas/techalerts/TA08-260A.html"},{"name":"31588","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31588"},{"name":"31019","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31019"},{"name":"ADV-2008-2029","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2029/references"},{"name":"SSRT080058","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=121630706004256&w=2"},{"name":"6123","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/6123"},{"name":"IZ26671","tags":["vendor-advisory","x_refsource_AIXAPAR"],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26671"},{"name":"FEDORA-2008-6281","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html"},{"name":"ADV-2008-2268","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2268"},{"name":"ADV-2009-0297","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2009/0297"},{"name":"HPSBUX02351","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=121630706004256&w=2"},{"name":"31207","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31207"},{"name":"31031","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31031"},{"name":"ADV-2008-2584","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2584"},{"name":"31451","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31451"},{"name":"ADV-2008-2051","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2051/references"},{"name":"30977","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/30977"},{"name":"RHSA-2008:0789","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2008-0789.html"},{"name":"ADV-2008-2377","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2377"},{"name":"HPSBNS02405","tags":["vendor-advisory","x_refsource_HP"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"},{"name":"1020558","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020558"},{"name":"31221","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31221"},{"name":"RHSA-2008:0533","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2008-0533.html"},{"name":"[4.3] 004: SECURITY FIX: July 23, 2008","tags":["vendor-advisory","x_refsource_OPENBSD"],"url":"http://www.openbsd.org/errata43.html#004_bind"},{"name":"1020804","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020804"},{"name":"31143","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31143"},{"name":"20080808 New paper: An Illustrated Guide to the Kaminsky DNS Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/495289/100/0/threaded"},{"name":"ADV-2008-2195","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2195/references"},{"name":"ADV-2008-2196","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2196/references"},{"name":"33714","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/33714"},{"name":"HPSBTU02358","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=121866517322103&w=2"},{"name":"33786","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/33786"},{"name":"1020448","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020448"},{"name":"31882","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31882"},{"name":"ADV-2008-2384","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2384"},{"name":"IZ26669","tags":["vendor-advisory","x_refsource_AIXAPAR"],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26669"},{"tags":["x_refsource_CONFIRM"],"url":"http://up2date.astaro.com/2008/08/up2date_7202_released.html"},{"name":"ADV-2008-2123","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2123/references"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.apple.com/kb/HT3026"},{"name":"31014","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31014"},{"name":"30979","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/30979"},{"name":"1020575","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020575"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"},{"name":"ADV-2008-2482","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2482"},{"name":"IZ26672","tags":["vendor-advisory","x_refsource_AIXAPAR"],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26672"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.apple.com/kb/HT3129"},{"name":"DSA-1619","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2008/dsa-1619"},{"name":"ADV-2008-2166","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2166/references"},{"name":"31072","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31072"},{"name":"ADV-2008-2139","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2139/references"},{"name":"oval:org.mitre.oval:def:5761","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761"},{"name":"ADV-2008-2092","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2092/references"},{"name":"31482","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31482"},{"name":"IZ26670","tags":["vendor-advisory","x_refsource_AIXAPAR"],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26670"},{"name":"MDVSA-2008:139","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:139"},{"name":"oval:org.mitre.oval:def:5917","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917"},{"name":"30989","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/30989"},{"name":"ADV-2008-2055","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2055/references"},{"name":"SSRT071449","tags":["vendor-advisory","x_refsource_HP"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.ipcop.org/index.php?name=News&file=article&sid=40"},{"name":"31065","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31065"},{"name":"31254","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31254"},{"name":"20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded"},{"tags":["x_refsource_MISC"],"url":"http://www.doxpara.com/?p=1176"},{"name":"NetBSD-SA2008-009","tags":["vendor-advisory","x_refsource_NETBSD"],"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc"},{"name":"USN-627-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/usn-627-1"},{"name":"ADV-2010-0622","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2010/0622"},{"name":"1020576","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020576"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.isc.org/index.pl?/sw/bind/bind-security.php"},{"name":"HPSBOV02357","tags":["vendor-advisory","x_refsource_HP"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520"},{"name":"31153","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31153"},{"tags":["x_refsource_CONFIRM"],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231"},{"name":"ADV-2008-2549","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2549"},{"name":"IZ26667","tags":["vendor-advisory","x_refsource_AIXAPAR"],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26667"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html"},{"name":"31213","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31213"},{"name":"31030","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31030"},{"name":"USN-622-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/usn-622-1"},{"name":"31033","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31033"},{"tags":["x_refsource_MISC"],"url":"http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"},{"name":"1020440","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020440"},{"name":"APPLE-SA-2008-09-12","tags":["vendor-advisory","x_refsource_APPLE"],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"},{"tags":["x_refsource_MISC"],"url":"http://www.doxpara.com/DMK_BO2K8.ppt"},{"name":"20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.","tags":["mailing-list","x_refsource_FULLDISC"],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"},{"name":"DSA-1604","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2008/dsa-1604"},{"name":"31823","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31823"},{"name":"31326","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31326"},{"name":"ADV-2008-2558","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2558"},{"name":"6122","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/6122"},{"name":"oval:org.mitre.oval:def:5725","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725"},{"tags":["x_refsource_MISC"],"url":"http://www.caughq.org/exploits/CAU-EX-2008-0003.txt"},{"name":"cisco-multiple-dns-cache-poisoning(43637)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"},{"name":"ADV-2008-2383","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2383"},{"name":"1020560","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020560"},{"name":"31900","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31900"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.citrix.com/article/CTX118183"},{"name":"30925","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/30925"},{"name":"ADV-2009-0311","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2009/0311"},{"tags":["x_refsource_CONFIRM"],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"},{"name":"DSA-1623","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2008/dsa-1623"},{"name":"ADV-2008-2582","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2582"},{"tags":["x_refsource_MISC"],"url":"http://www.caughq.org/exploits/CAU-EX-2008-0002.txt"},{"name":"DSA-1605","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2008/dsa-1605"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.novell.com/support/viewContent.do?externalId=7000912"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"},{"name":"ADV-2008-2342","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2342"},{"name":"ADV-2008-2114","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2114/references"},{"name":"30973","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/30973"},{"name":"31204","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31204"},{"name":"31354","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31354"},{"name":"GLSA-200812-17","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://security.gentoo.org/glsa/glsa-200812-17.xml"},{"name":"oval:org.mitre.oval:def:12117","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117"},{"name":"33178","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/33178"},{"name":"30988","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/30988"},{"name":"APPLE-SA-2008-09-09","tags":["vendor-advisory","x_refsource_APPLE"],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"},{"name":"31011","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31011"},{"tags":["x_refsource_MISC"],"url":"http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"},{"name":"ADV-2008-2334","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2334"},{"name":"1020577","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020577"},{"name":"31422","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31422"},{"name":"31197","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31197"},{"name":"1020548","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020548"},{"name":"ADV-2008-2467","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2467"},{"name":"240048","tags":["vendor-advisory","x_refsource_SUNALERT"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"},{"name":"TA08-190B","tags":["third-party-advisory","x_refsource_CERT"],"url":"http://www.us-cert.gov/cas/techalerts/TA08-190B.html"},{"name":"TA08-190A","tags":["third-party-advisory","x_refsource_CERT"],"url":"http://www.us-cert.gov/cas/techalerts/TA08-190A.html"},{"name":"GLSA-200807-08","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://security.gentoo.org/glsa/glsa-200807-08.xml"},{"name":"31022","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31022"},{"name":"SSA:2008-191","tags":["vendor-advisory","x_refsource_SLACKWARE"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239"},{"name":"1020449","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020449"},{"name":"31093","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31093"},{"name":"31052","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31052"},{"name":"30980","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/30980"},{"name":"SSA:2008-205-01","tags":["vendor-advisory","x_refsource_SLACKWARE"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680"},{"tags":["x_refsource_CONFIRM"],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"},{"name":"31199","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31199"},{"name":"ADV-2008-2030","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2030/references"},{"name":"ADV-2008-2291","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2291"},{"name":"ADV-2008-2023","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2023/references"},{"name":"SSRT090014","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=123324863916385&w=2"},{"name":"ADV-2008-2466","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2466"},{"name":"MS08-037","tags":["vendor-advisory","x_refsource_MS"],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"},{"name":"31212","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31212"},{"name":"ADV-2008-2113","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2113/references"},{"name":"31152","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31152"},{"name":"ADV-2008-2019","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2019/references"},{"name":"ADV-2008-2197","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2197/references"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@microsoft.com","ID":"CVE-2008-1447","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\""}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"1020438","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020438"},{"name":"FEDORA-2008-6256","refsource":"FEDORA","url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html"},{"name":"SUSE-SR:2008:017","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"},{"name":"VU#800113","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/800113"},{"name":"31137","refsource":"SECUNIA","url":"http://secunia.com/advisories/31137"},{"name":"31430","refsource":"SECUNIA","url":"http://secunia.com/advisories/31430"},{"name":"http://www.kb.cert.org/vuls/id/MIMG-7DWR4J","refsource":"CONFIRM","url":"http://www.kb.cert.org/vuls/id/MIMG-7DWR4J"},{"name":"31169","refsource":"SECUNIA","url":"http://secunia.com/advisories/31169"},{"name":"http://www.phys.uu.nl/~rombouts/pdnsd.html","refsource":"CONFIRM","url":"http://www.phys.uu.nl/~rombouts/pdnsd.html"},{"name":"1020702","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020702"},{"name":"GLSA-201209-25","refsource":"GENTOO","url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"name":"ADV-2008-2052","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2052/references"},{"name":"1020561","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020561"},{"name":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html","refsource":"CONFIRM","url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html"},{"name":"HPSBOV03226","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2"},{"name":"1020578","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020578"},{"name":"FreeBSD-SA-08:06","refsource":"FREEBSD","url":"http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc"},{"name":"oval:org.mitre.oval:def:9627","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627"},{"name":"1020802","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020802"},{"name":"HPSBMP02404","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=123324863916385&w=2"},{"name":"30131","refsource":"BID","url":"http://www.securityfocus.com/bid/30131"},{"name":"[4.2] 013: SECURITY FIX: July 23, 2008","refsource":"OPENBSD","url":"http://www.openbsd.org/errata42.html#013_bind"},{"name":"31236","refsource":"SECUNIA","url":"http://secunia.com/advisories/31236"},{"name":"APPLE-SA-2008-09-15","refsource":"APPLE","url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"},{"name":"1020651","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020651"},{"name":"1020437","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020437"},{"name":"31209","refsource":"SECUNIA","url":"http://secunia.com/advisories/31209"},{"name":"31012","refsource":"SECUNIA","url":"http://secunia.com/advisories/31012"},{"name":"31151","refsource":"SECUNIA","url":"http://secunia.com/advisories/31151"},{"name":"ADV-2008-2050","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2050/references"},{"name":"http://support.citrix.com/article/CTX117991","refsource":"CONFIRM","url":"http://support.citrix.com/article/CTX117991"},{"name":"SSRT101004","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2"},{"name":"31237","refsource":"SECUNIA","url":"http://secunia.com/advisories/31237"},{"name":"http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog","refsource":"CONFIRM","url":"http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog"},{"name":"APPLE-SA-2008-07-31","refsource":"APPLE","url":"http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"},{"name":"win-dns-client-server-spoofing(43334)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"},{"name":"31495","refsource":"SECUNIA","url":"http://secunia.com/advisories/31495"},{"name":"6130","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/6130"},{"name":"20080708 Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks","refsource":"CISCO","url":"http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml"},{"name":"1020579","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020579"},{"name":"http://www.nominum.com/asset_upload_file741_2661.pdf","refsource":"MISC","url":"http://www.nominum.com/asset_upload_file741_2661.pdf"},{"name":"1020653","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020653"},{"name":"30998","refsource":"SECUNIA","url":"http://secunia.com/advisories/30998"},{"name":"DSA-1603","refsource":"DEBIAN","url":"http://www.debian.org/security/2008/dsa-1603"},{"name":"ADV-2008-2525","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2525"},{"name":"SUSE-SA:2008:033","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"},{"name":"31094","refsource":"SECUNIA","url":"http://secunia.com/advisories/31094"},{"name":"IZ26668","refsource":"AIXAPAR","url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26668"},{"name":"31687","refsource":"SECUNIA","url":"http://secunia.com/advisories/31687"},{"name":"ADV-2008-2025","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2025/references"},{"name":"239392","refsource":"SUNALERT","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"},{"name":"TA08-260A","refsource":"CERT","url":"http://www.us-cert.gov/cas/techalerts/TA08-260A.html"},{"name":"31588","refsource":"SECUNIA","url":"http://secunia.com/advisories/31588"},{"name":"31019","refsource":"SECUNIA","url":"http://secunia.com/advisories/31019"},{"name":"ADV-2008-2029","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2029/references"},{"name":"SSRT080058","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=121630706004256&w=2"},{"name":"6123","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/6123"},{"name":"IZ26671","refsource":"AIXAPAR","url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26671"},{"name":"FEDORA-2008-6281","refsource":"FEDORA","url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html"},{"name":"ADV-2008-2268","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2268"},{"name":"ADV-2009-0297","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2009/0297"},{"name":"HPSBUX02351","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=121630706004256&w=2"},{"name":"31207","refsource":"SECUNIA","url":"http://secunia.com/advisories/31207"},{"name":"31031","refsource":"SECUNIA","url":"http://secunia.com/advisories/31031"},{"name":"ADV-2008-2584","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2584"},{"name":"31451","refsource":"SECUNIA","url":"http://secunia.com/advisories/31451"},{"name":"ADV-2008-2051","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2051/references"},{"name":"30977","refsource":"SECUNIA","url":"http://secunia.com/advisories/30977"},{"name":"RHSA-2008:0789","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2008-0789.html"},{"name":"ADV-2008-2377","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2377"},{"name":"HPSBNS02405","refsource":"HP","url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"},{"name":"1020558","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020558"},{"name":"31221","refsource":"SECUNIA","url":"http://secunia.com/advisories/31221"},{"name":"RHSA-2008:0533","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2008-0533.html"},{"name":"[4.3] 004: SECURITY FIX: July 23, 2008","refsource":"OPENBSD","url":"http://www.openbsd.org/errata43.html#004_bind"},{"name":"1020804","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020804"},{"name":"31143","refsource":"SECUNIA","url":"http://secunia.com/advisories/31143"},{"name":"20080808 New paper: An Illustrated Guide to the Kaminsky DNS Vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/495289/100/0/threaded"},{"name":"ADV-2008-2195","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2195/references"},{"name":"ADV-2008-2196","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2196/references"},{"name":"33714","refsource":"SECUNIA","url":"http://secunia.com/advisories/33714"},{"name":"HPSBTU02358","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=121866517322103&w=2"},{"name":"33786","refsource":"SECUNIA","url":"http://secunia.com/advisories/33786"},{"name":"1020448","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020448"},{"name":"31882","refsource":"SECUNIA","url":"http://secunia.com/advisories/31882"},{"name":"ADV-2008-2384","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2384"},{"name":"IZ26669","refsource":"AIXAPAR","url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26669"},{"name":"http://up2date.astaro.com/2008/08/up2date_7202_released.html","refsource":"CONFIRM","url":"http://up2date.astaro.com/2008/08/up2date_7202_released.html"},{"name":"ADV-2008-2123","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2123/references"},{"name":"http://support.apple.com/kb/HT3026","refsource":"CONFIRM","url":"http://support.apple.com/kb/HT3026"},{"name":"31014","refsource":"SECUNIA","url":"http://secunia.com/advisories/31014"},{"name":"30979","refsource":"SECUNIA","url":"http://secunia.com/advisories/30979"},{"name":"1020575","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020575"},{"name":"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/","refsource":"CONFIRM","url":"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"},{"name":"ADV-2008-2482","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2482"},{"name":"IZ26672","refsource":"AIXAPAR","url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26672"},{"name":"http://support.apple.com/kb/HT3129","refsource":"CONFIRM","url":"http://support.apple.com/kb/HT3129"},{"name":"DSA-1619","refsource":"DEBIAN","url":"http://www.debian.org/security/2008/dsa-1619"},{"name":"ADV-2008-2166","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2166/references"},{"name":"31072","refsource":"SECUNIA","url":"http://secunia.com/advisories/31072"},{"name":"ADV-2008-2139","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2139/references"},{"name":"oval:org.mitre.oval:def:5761","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761"},{"name":"ADV-2008-2092","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2092/references"},{"name":"31482","refsource":"SECUNIA","url":"http://secunia.com/advisories/31482"},{"name":"IZ26670","refsource":"AIXAPAR","url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26670"},{"name":"MDVSA-2008:139","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:139"},{"name":"oval:org.mitre.oval:def:5917","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917"},{"name":"30989","refsource":"SECUNIA","url":"http://secunia.com/advisories/30989"},{"name":"ADV-2008-2055","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2055/references"},{"name":"SSRT071449","refsource":"HP","url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"},{"name":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152","refsource":"CONFIRM","url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152"},{"name":"http://www.ipcop.org/index.php?name=News&file=article&sid=40","refsource":"CONFIRM","url":"http://www.ipcop.org/index.php?name=News&file=article&sid=40"},{"name":"31065","refsource":"SECUNIA","url":"http://secunia.com/advisories/31065"},{"name":"31254","refsource":"SECUNIA","url":"http://secunia.com/advisories/31254"},{"name":"20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded"},{"name":"http://www.doxpara.com/?p=1176","refsource":"MISC","url":"http://www.doxpara.com/?p=1176"},{"name":"NetBSD-SA2008-009","refsource":"NETBSD","url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc"},{"name":"USN-627-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/usn-627-1"},{"name":"ADV-2010-0622","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2010/0622"},{"name":"1020576","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020576"},{"name":"http://www.isc.org/index.pl?/sw/bind/bind-security.php","refsource":"CONFIRM","url":"http://www.isc.org/index.pl?/sw/bind/bind-security.php"},{"name":"HPSBOV02357","refsource":"HP","url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520"},{"name":"31153","refsource":"SECUNIA","url":"http://secunia.com/advisories/31153"},{"name":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231","refsource":"CONFIRM","url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231"},{"name":"ADV-2008-2549","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2549"},{"name":"IZ26667","refsource":"AIXAPAR","url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26667"},{"name":"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html","refsource":"CONFIRM","url":"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html"},{"name":"31213","refsource":"SECUNIA","url":"http://secunia.com/advisories/31213"},{"name":"31030","refsource":"SECUNIA","url":"http://secunia.com/advisories/31030"},{"name":"USN-622-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/usn-622-1"},{"name":"31033","refsource":"SECUNIA","url":"http://secunia.com/advisories/31033"},{"name":"http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html","refsource":"MISC","url":"http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"},{"name":"1020440","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020440"},{"name":"APPLE-SA-2008-09-12","refsource":"APPLE","url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"},{"name":"http://www.doxpara.com/DMK_BO2K8.ppt","refsource":"MISC","url":"http://www.doxpara.com/DMK_BO2K8.ppt"},{"name":"20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.","refsource":"FULLDISC","url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"},{"name":"DSA-1604","refsource":"DEBIAN","url":"http://www.debian.org/security/2008/dsa-1604"},{"name":"31823","refsource":"SECUNIA","url":"http://secunia.com/advisories/31823"},{"name":"31326","refsource":"SECUNIA","url":"http://secunia.com/advisories/31326"},{"name":"ADV-2008-2558","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2558"},{"name":"6122","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/6122"},{"name":"oval:org.mitre.oval:def:5725","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725"},{"name":"http://www.caughq.org/exploits/CAU-EX-2008-0003.txt","refsource":"MISC","url":"http://www.caughq.org/exploits/CAU-EX-2008-0003.txt"},{"name":"cisco-multiple-dns-cache-poisoning(43637)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"},{"name":"ADV-2008-2383","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2383"},{"name":"1020560","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020560"},{"name":"31900","refsource":"SECUNIA","url":"http://secunia.com/advisories/31900"},{"name":"http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q","refsource":"CONFIRM","url":"http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q"},{"name":"http://support.citrix.com/article/CTX118183","refsource":"CONFIRM","url":"http://support.citrix.com/article/CTX118183"},{"name":"30925","refsource":"SECUNIA","url":"http://secunia.com/advisories/30925"},{"name":"ADV-2009-0311","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2009/0311"},{"name":"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018","refsource":"CONFIRM","url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"},{"name":"DSA-1623","refsource":"DEBIAN","url":"http://www.debian.org/security/2008/dsa-1623"},{"name":"ADV-2008-2582","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2582"},{"name":"http://www.caughq.org/exploits/CAU-EX-2008-0002.txt","refsource":"MISC","url":"http://www.caughq.org/exploits/CAU-EX-2008-0002.txt"},{"name":"DSA-1605","refsource":"DEBIAN","url":"http://www.debian.org/security/2008/dsa-1605"},{"name":"http://www.novell.com/support/viewContent.do?externalId=7000912","refsource":"CONFIRM","url":"http://www.novell.com/support/viewContent.do?externalId=7000912"},{"name":"http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning","refsource":"CONFIRM","url":"http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"},{"name":"ADV-2008-2342","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2342"},{"name":"ADV-2008-2114","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2114/references"},{"name":"30973","refsource":"SECUNIA","url":"http://secunia.com/advisories/30973"},{"name":"31204","refsource":"SECUNIA","url":"http://secunia.com/advisories/31204"},{"name":"31354","refsource":"SECUNIA","url":"http://secunia.com/advisories/31354"},{"name":"GLSA-200812-17","refsource":"GENTOO","url":"http://security.gentoo.org/glsa/glsa-200812-17.xml"},{"name":"oval:org.mitre.oval:def:12117","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117"},{"name":"33178","refsource":"SECUNIA","url":"http://secunia.com/advisories/33178"},{"name":"30988","refsource":"SECUNIA","url":"http://secunia.com/advisories/30988"},{"name":"APPLE-SA-2008-09-09","refsource":"APPLE","url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"},{"name":"31011","refsource":"SECUNIA","url":"http://secunia.com/advisories/31011"},{"name":"http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html","refsource":"MISC","url":"http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"},{"name":"ADV-2008-2334","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2334"},{"name":"1020577","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020577"},{"name":"31422","refsource":"SECUNIA","url":"http://secunia.com/advisories/31422"},{"name":"31197","refsource":"SECUNIA","url":"http://secunia.com/advisories/31197"},{"name":"1020548","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020548"},{"name":"ADV-2008-2467","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2467"},{"name":"240048","refsource":"SUNALERT","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"},{"name":"TA08-190B","refsource":"CERT","url":"http://www.us-cert.gov/cas/techalerts/TA08-190B.html"},{"name":"TA08-190A","refsource":"CERT","url":"http://www.us-cert.gov/cas/techalerts/TA08-190A.html"},{"name":"GLSA-200807-08","refsource":"GENTOO","url":"http://security.gentoo.org/glsa/glsa-200807-08.xml"},{"name":"31022","refsource":"SECUNIA","url":"http://secunia.com/advisories/31022"},{"name":"SSA:2008-191","refsource":"SLACKWARE","url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239"},{"name":"1020449","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1020449"},{"name":"31093","refsource":"SECUNIA","url":"http://secunia.com/advisories/31093"},{"name":"31052","refsource":"SECUNIA","url":"http://secunia.com/advisories/31052"},{"name":"30980","refsource":"SECUNIA","url":"http://secunia.com/advisories/30980"},{"name":"SSA:2008-205-01","refsource":"SLACKWARE","url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680"},{"name":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401","refsource":"CONFIRM","url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"},{"name":"31199","refsource":"SECUNIA","url":"http://secunia.com/advisories/31199"},{"name":"ADV-2008-2030","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2030/references"},{"name":"ADV-2008-2291","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2291"},{"name":"ADV-2008-2023","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2023/references"},{"name":"SSRT090014","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=123324863916385&w=2"},{"name":"ADV-2008-2466","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2466"},{"name":"MS08-037","refsource":"MS","url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"},{"name":"31212","refsource":"SECUNIA","url":"http://secunia.com/advisories/31212"},{"name":"ADV-2008-2113","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2113/references"},{"name":"31152","refsource":"SECUNIA","url":"http://secunia.com/advisories/31152"},{"name":"ADV-2008-2019","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2019/references"},{"name":"ADV-2008-2197","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2197/references"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T08:24:42.012Z"},"title":"CVE Program Container","references":[{"name":"1020438","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020438"},{"name":"FEDORA-2008-6256","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html"},{"name":"SUSE-SR:2008:017","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"},{"name":"VU#800113","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/800113"},{"name":"31137","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31137"},{"name":"31430","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31430"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/MIMG-7DWR4J"},{"name":"31169","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31169"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.phys.uu.nl/~rombouts/pdnsd.html"},{"name":"1020702","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020702"},{"name":"GLSA-201209-25","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"name":"ADV-2008-2052","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2052/references"},{"name":"1020561","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020561"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html"},{"name":"HPSBOV03226","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2"},{"name":"1020578","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020578"},{"name":"FreeBSD-SA-08:06","tags":["vendor-advisory","x_refsource_FREEBSD","x_transferred"],"url":"http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc"},{"name":"oval:org.mitre.oval:def:9627","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627"},{"name":"1020802","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020802"},{"name":"HPSBMP02404","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=123324863916385&w=2"},{"name":"30131","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/30131"},{"name":"[4.2] 013: SECURITY FIX: July 23, 2008","tags":["vendor-advisory","x_refsource_OPENBSD","x_transferred"],"url":"http://www.openbsd.org/errata42.html#013_bind"},{"name":"31236","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31236"},{"name":"APPLE-SA-2008-09-15","tags":["vendor-advisory","x_refsource_APPLE","x_transferred"],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"},{"name":"1020651","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020651"},{"name":"1020437","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020437"},{"name":"31209","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31209"},{"name":"31012","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31012"},{"name":"31151","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31151"},{"name":"ADV-2008-2050","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2050/references"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.citrix.com/article/CTX117991"},{"name":"SSRT101004","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2"},{"name":"31237","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31237"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog"},{"name":"APPLE-SA-2008-07-31","tags":["vendor-advisory","x_refsource_APPLE","x_transferred"],"url":"http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"},{"name":"win-dns-client-server-spoofing(43334)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"},{"name":"31495","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31495"},{"name":"6130","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/6130"},{"name":"20080708 Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks","tags":["vendor-advisory","x_refsource_CISCO","x_transferred"],"url":"http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml"},{"name":"1020579","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020579"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.nominum.com/asset_upload_file741_2661.pdf"},{"name":"1020653","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020653"},{"name":"30998","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/30998"},{"name":"DSA-1603","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2008/dsa-1603"},{"name":"ADV-2008-2525","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2525"},{"name":"SUSE-SA:2008:033","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"},{"name":"31094","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31094"},{"name":"IZ26668","tags":["vendor-advisory","x_refsource_AIXAPAR","x_transferred"],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26668"},{"name":"31687","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31687"},{"name":"ADV-2008-2025","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2025/references"},{"name":"239392","tags":["vendor-advisory","x_refsource_SUNALERT","x_transferred"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"},{"name":"TA08-260A","tags":["third-party-advisory","x_refsource_CERT","x_transferred"],"url":"http://www.us-cert.gov/cas/techalerts/TA08-260A.html"},{"name":"31588","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31588"},{"name":"31019","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31019"},{"name":"ADV-2008-2029","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2029/references"},{"name":"SSRT080058","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=121630706004256&w=2"},{"name":"6123","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/6123"},{"name":"IZ26671","tags":["vendor-advisory","x_refsource_AIXAPAR","x_transferred"],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26671"},{"name":"FEDORA-2008-6281","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html"},{"name":"ADV-2008-2268","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2268"},{"name":"ADV-2009-0297","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2009/0297"},{"name":"HPSBUX02351","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=121630706004256&w=2"},{"name":"31207","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31207"},{"name":"31031","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31031"},{"name":"ADV-2008-2584","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2584"},{"name":"31451","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31451"},{"name":"ADV-2008-2051","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2051/references"},{"name":"30977","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/30977"},{"name":"RHSA-2008:0789","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2008-0789.html"},{"name":"ADV-2008-2377","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2377"},{"name":"HPSBNS02405","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"},{"name":"1020558","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020558"},{"name":"31221","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31221"},{"name":"RHSA-2008:0533","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2008-0533.html"},{"name":"[4.3] 004: SECURITY FIX: July 23, 2008","tags":["vendor-advisory","x_refsource_OPENBSD","x_transferred"],"url":"http://www.openbsd.org/errata43.html#004_bind"},{"name":"1020804","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020804"},{"name":"31143","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31143"},{"name":"20080808 New paper: An Illustrated Guide to the Kaminsky DNS Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/495289/100/0/threaded"},{"name":"ADV-2008-2195","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2195/references"},{"name":"ADV-2008-2196","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2196/references"},{"name":"33714","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/33714"},{"name":"HPSBTU02358","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=121866517322103&w=2"},{"name":"33786","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/33786"},{"name":"1020448","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020448"},{"name":"31882","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31882"},{"name":"ADV-2008-2384","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2384"},{"name":"IZ26669","tags":["vendor-advisory","x_refsource_AIXAPAR","x_transferred"],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26669"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://up2date.astaro.com/2008/08/up2date_7202_released.html"},{"name":"ADV-2008-2123","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2123/references"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.apple.com/kb/HT3026"},{"name":"31014","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31014"},{"name":"30979","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/30979"},{"name":"1020575","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020575"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"},{"name":"ADV-2008-2482","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2482"},{"name":"IZ26672","tags":["vendor-advisory","x_refsource_AIXAPAR","x_transferred"],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26672"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.apple.com/kb/HT3129"},{"name":"DSA-1619","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2008/dsa-1619"},{"name":"ADV-2008-2166","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2166/references"},{"name":"31072","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31072"},{"name":"ADV-2008-2139","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2139/references"},{"name":"oval:org.mitre.oval:def:5761","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761"},{"name":"ADV-2008-2092","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2092/references"},{"name":"31482","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31482"},{"name":"IZ26670","tags":["vendor-advisory","x_refsource_AIXAPAR","x_transferred"],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26670"},{"name":"MDVSA-2008:139","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:139"},{"name":"oval:org.mitre.oval:def:5917","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917"},{"name":"30989","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/30989"},{"name":"ADV-2008-2055","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2055/references"},{"name":"SSRT071449","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.ipcop.org/index.php?name=News&file=article&sid=40"},{"name":"31065","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31065"},{"name":"31254","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31254"},{"name":"20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.doxpara.com/?p=1176"},{"name":"NetBSD-SA2008-009","tags":["vendor-advisory","x_refsource_NETBSD","x_transferred"],"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc"},{"name":"USN-627-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/usn-627-1"},{"name":"ADV-2010-0622","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2010/0622"},{"name":"1020576","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020576"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.isc.org/index.pl?/sw/bind/bind-security.php"},{"name":"HPSBOV02357","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520"},{"name":"31153","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31153"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231"},{"name":"ADV-2008-2549","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2549"},{"name":"IZ26667","tags":["vendor-advisory","x_refsource_AIXAPAR","x_transferred"],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26667"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html"},{"name":"31213","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31213"},{"name":"31030","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31030"},{"name":"USN-622-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/usn-622-1"},{"name":"31033","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31033"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"},{"name":"1020440","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020440"},{"name":"APPLE-SA-2008-09-12","tags":["vendor-advisory","x_refsource_APPLE","x_transferred"],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.doxpara.com/DMK_BO2K8.ppt"},{"name":"20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.","tags":["mailing-list","x_refsource_FULLDISC","x_transferred"],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"},{"name":"DSA-1604","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2008/dsa-1604"},{"name":"31823","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31823"},{"name":"31326","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31326"},{"name":"ADV-2008-2558","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2558"},{"name":"6122","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/6122"},{"name":"oval:org.mitre.oval:def:5725","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.caughq.org/exploits/CAU-EX-2008-0003.txt"},{"name":"cisco-multiple-dns-cache-poisoning(43637)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"},{"name":"ADV-2008-2383","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2383"},{"name":"1020560","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020560"},{"name":"31900","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31900"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.citrix.com/article/CTX118183"},{"name":"30925","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/30925"},{"name":"ADV-2009-0311","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2009/0311"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"},{"name":"DSA-1623","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2008/dsa-1623"},{"name":"ADV-2008-2582","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2582"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.caughq.org/exploits/CAU-EX-2008-0002.txt"},{"name":"DSA-1605","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2008/dsa-1605"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.novell.com/support/viewContent.do?externalId=7000912"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"},{"name":"ADV-2008-2342","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2342"},{"name":"ADV-2008-2114","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2114/references"},{"name":"30973","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/30973"},{"name":"31204","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31204"},{"name":"31354","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31354"},{"name":"GLSA-200812-17","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://security.gentoo.org/glsa/glsa-200812-17.xml"},{"name":"oval:org.mitre.oval:def:12117","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117"},{"name":"33178","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/33178"},{"name":"30988","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/30988"},{"name":"APPLE-SA-2008-09-09","tags":["vendor-advisory","x_refsource_APPLE","x_transferred"],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"},{"name":"31011","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31011"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"},{"name":"ADV-2008-2334","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2334"},{"name":"1020577","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020577"},{"name":"31422","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31422"},{"name":"31197","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31197"},{"name":"1020548","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020548"},{"name":"ADV-2008-2467","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2467"},{"name":"240048","tags":["vendor-advisory","x_refsource_SUNALERT","x_transferred"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"},{"name":"TA08-190B","tags":["third-party-advisory","x_refsource_CERT","x_transferred"],"url":"http://www.us-cert.gov/cas/techalerts/TA08-190B.html"},{"name":"TA08-190A","tags":["third-party-advisory","x_refsource_CERT","x_transferred"],"url":"http://www.us-cert.gov/cas/techalerts/TA08-190A.html"},{"name":"GLSA-200807-08","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://security.gentoo.org/glsa/glsa-200807-08.xml"},{"name":"31022","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31022"},{"name":"SSA:2008-191","tags":["vendor-advisory","x_refsource_SLACKWARE","x_transferred"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239"},{"name":"1020449","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020449"},{"name":"31093","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31093"},{"name":"31052","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31052"},{"name":"30980","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/30980"},{"name":"SSA:2008-205-01","tags":["vendor-advisory","x_refsource_SLACKWARE","x_transferred"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"},{"name":"31199","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31199"},{"name":"ADV-2008-2030","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2030/references"},{"name":"ADV-2008-2291","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2291"},{"name":"ADV-2008-2023","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2023/references"},{"name":"SSRT090014","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=123324863916385&w=2"},{"name":"ADV-2008-2466","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2466"},{"name":"MS08-037","tags":["vendor-advisory","x_refsource_MS","x_transferred"],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"},{"name":"31212","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31212"},{"name":"ADV-2008-2113","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2113/references"},{"name":"31152","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31152"},{"name":"ADV-2008-2019","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2019/references"},{"name":"ADV-2008-2197","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2197/references"}]}]},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2008-1447","datePublished":"2008-07-08T23:00:00.000Z","dateReserved":"2008-03-21T00:00:00.000Z","dateUpdated":"2024-08-07T08:24:42.012Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}