Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2008-1447

Summary
Assigner-microsoft
Assigner Org ID-f38d906d-7342-40ea-92c1-6c4a2c6478c8
Published At-08 Jul, 2008 | 23:00
Updated At-07 Aug, 2024 | 08:24
Rejected At-
Credits

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:microsoft
Assigner Org ID:f38d906d-7342-40ea-92c1-6c4a2c6478c8
Published At:08 Jul, 2008 | 23:00
Updated At:07 Aug, 2024 | 08:24
Rejected At:
â–¼CVE Numbering Authority (CNA)

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securitytracker.com/id?1020438
vdb-entry
x_refsource_SECTRACK
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
vendor-advisory
x_refsource_FEDORA
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
vendor-advisory
x_refsource_SUSE
http://www.kb.cert.org/vuls/id/800113
third-party-advisory
x_refsource_CERT-VN
http://secunia.com/advisories/31137
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31430
third-party-advisory
x_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
x_refsource_CONFIRM
http://secunia.com/advisories/31169
third-party-advisory
x_refsource_SECUNIA
http://www.phys.uu.nl/~rombouts/pdnsd.html
x_refsource_CONFIRM
http://www.securitytracker.com/id?1020702
vdb-entry
x_refsource_SECTRACK
http://security.gentoo.org/glsa/glsa-201209-25.xml
vendor-advisory
x_refsource_GENTOO
http://www.vupen.com/english/advisories/2008/2052/references
vdb-entry
x_refsource_VUPEN
http://www.securitytracker.com/id?1020561
vdb-entry
x_refsource_SECTRACK
http://www.vmware.com/security/advisories/VMSA-2008-0014.html
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141879471518471&w=2
vendor-advisory
x_refsource_HP
http://www.securitytracker.com/id?1020578
vdb-entry
x_refsource_SECTRACK
http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
vendor-advisory
x_refsource_FREEBSD
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
vdb-entry
signature
x_refsource_OVAL
http://www.securitytracker.com/id?1020802
vdb-entry
x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=123324863916385&w=2
vendor-advisory
x_refsource_HP
http://www.securityfocus.com/bid/30131
vdb-entry
x_refsource_BID
http://www.openbsd.org/errata42.html#013_bind
vendor-advisory
x_refsource_OPENBSD
http://secunia.com/advisories/31236
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
vendor-advisory
x_refsource_APPLE
http://www.securitytracker.com/id?1020651
vdb-entry
x_refsource_SECTRACK
http://www.securitytracker.com/id?1020437
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31209
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31012
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31151
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2050/references
vdb-entry
x_refsource_VUPEN
http://support.citrix.com/article/CTX117991
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141879471518471&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/31237
third-party-advisory
x_refsource_SECUNIA
http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
x_refsource_CONFIRM
http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
vendor-advisory
x_refsource_APPLE
https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
vdb-entry
x_refsource_XF
http://secunia.com/advisories/31495
third-party-advisory
x_refsource_SECUNIA
https://www.exploit-db.com/exploits/6130
exploit
x_refsource_EXPLOIT-DB
http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
vendor-advisory
x_refsource_CISCO
http://www.securitytracker.com/id?1020579
vdb-entry
x_refsource_SECTRACK
http://www.nominum.com/asset_upload_file741_2661.pdf
x_refsource_MISC
http://www.securitytracker.com/id?1020653
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/30998
third-party-advisory
x_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1603
vendor-advisory
x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2008/2525
vdb-entry
x_refsource_VUPEN
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/31094
third-party-advisory
x_refsource_SECUNIA
http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
vendor-advisory
x_refsource_AIXAPAR
http://secunia.com/advisories/31687
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2025/references
vdb-entry
x_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
vendor-advisory
x_refsource_SUNALERT
http://www.us-cert.gov/cas/techalerts/TA08-260A.html
third-party-advisory
x_refsource_CERT
http://secunia.com/advisories/31588
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31019
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2029/references
vdb-entry
x_refsource_VUPEN
http://marc.info/?l=bugtraq&m=121630706004256&w=2
vendor-advisory
x_refsource_HP
https://www.exploit-db.com/exploits/6123
exploit
x_refsource_EXPLOIT-DB
http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
vendor-advisory
x_refsource_AIXAPAR
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
vendor-advisory
x_refsource_FEDORA
http://www.vupen.com/english/advisories/2008/2268
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2009/0297
vdb-entry
x_refsource_VUPEN
http://marc.info/?l=bugtraq&m=121630706004256&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/31207
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31031
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2584
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31451
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2051/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/30977
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0789.html
vendor-advisory
x_refsource_REDHAT
http://www.vupen.com/english/advisories/2008/2377
vdb-entry
x_refsource_VUPEN
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
vendor-advisory
x_refsource_HP
http://www.securitytracker.com/id?1020558
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31221
third-party-advisory
x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2008-0533.html
vendor-advisory
x_refsource_REDHAT
http://www.openbsd.org/errata43.html#004_bind
vendor-advisory
x_refsource_OPENBSD
http://www.securitytracker.com/id?1020804
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31143
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/495289/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2008/2195/references
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/2196/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/33714
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=121866517322103&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/33786
third-party-advisory
x_refsource_SECUNIA
http://www.securitytracker.com/id?1020448
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31882
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2384
vdb-entry
x_refsource_VUPEN
http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
vendor-advisory
x_refsource_AIXAPAR
http://up2date.astaro.com/2008/08/up2date_7202_released.html
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/2123/references
vdb-entry
x_refsource_VUPEN
http://support.apple.com/kb/HT3026
x_refsource_CONFIRM
http://secunia.com/advisories/31014
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30979
third-party-advisory
x_refsource_SECUNIA
http://www.securitytracker.com/id?1020575
vdb-entry
x_refsource_SECTRACK
http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/2482
vdb-entry
x_refsource_VUPEN
http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
vendor-advisory
x_refsource_AIXAPAR
http://support.apple.com/kb/HT3129
x_refsource_CONFIRM
http://www.debian.org/security/2008/dsa-1619
vendor-advisory
x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2008/2166/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31072
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2139/references
vdb-entry
x_refsource_VUPEN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
vdb-entry
signature
x_refsource_OVAL
http://www.vupen.com/english/advisories/2008/2092/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31482
third-party-advisory
x_refsource_SECUNIA
http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
vendor-advisory
x_refsource_AIXAPAR
http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
vendor-advisory
x_refsource_MANDRIVA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/30989
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2055/references
vdb-entry
x_refsource_VUPEN
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
vendor-advisory
x_refsource_HP
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
x_refsource_CONFIRM
http://www.ipcop.org/index.php?name=News&file=article&sid=40
x_refsource_CONFIRM
http://secunia.com/advisories/31065
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31254
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/495869/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.doxpara.com/?p=1176
x_refsource_MISC
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
vendor-advisory
x_refsource_NETBSD
http://www.ubuntu.com/usn/usn-627-1
vendor-advisory
x_refsource_UBUNTU
http://www.vupen.com/english/advisories/2010/0622
vdb-entry
x_refsource_VUPEN
http://www.securitytracker.com/id?1020576
vdb-entry
x_refsource_SECTRACK
http://www.isc.org/index.pl?/sw/bind/bind-security.php
x_refsource_CONFIRM
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/31153
third-party-advisory
x_refsource_SECUNIA
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/2549
vdb-entry
x_refsource_VUPEN
http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
vendor-advisory
x_refsource_AIXAPAR
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
x_refsource_CONFIRM
http://secunia.com/advisories/31213
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31030
third-party-advisory
x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-622-1
vendor-advisory
x_refsource_UBUNTU
http://secunia.com/advisories/31033
third-party-advisory
x_refsource_SECUNIA
http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
x_refsource_MISC
http://www.securitytracker.com/id?1020440
vdb-entry
x_refsource_SECTRACK
http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
vendor-advisory
x_refsource_APPLE
http://www.doxpara.com/DMK_BO2K8.ppt
x_refsource_MISC
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
mailing-list
x_refsource_FULLDISC
http://www.debian.org/security/2008/dsa-1604
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/31823
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31326
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2558
vdb-entry
x_refsource_VUPEN
https://www.exploit-db.com/exploits/6122
exploit
x_refsource_EXPLOIT-DB
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
vdb-entry
signature
x_refsource_OVAL
http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
vdb-entry
x_refsource_XF
http://www.vupen.com/english/advisories/2008/2383
vdb-entry
x_refsource_VUPEN
http://www.securitytracker.com/id?1020560
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31900
third-party-advisory
x_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
x_refsource_CONFIRM
http://support.citrix.com/article/CTX118183
x_refsource_CONFIRM
http://secunia.com/advisories/30925
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/0311
vdb-entry
x_refsource_VUPEN
http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
x_refsource_CONFIRM
http://www.debian.org/security/2008/dsa-1623
vendor-advisory
x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2008/2582
vdb-entry
x_refsource_VUPEN
http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
x_refsource_MISC
http://www.debian.org/security/2008/dsa-1605
vendor-advisory
x_refsource_DEBIAN
http://www.novell.com/support/viewContent.do?externalId=7000912
x_refsource_CONFIRM
http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/2342
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/2114/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/30973
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31204
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31354
third-party-advisory
x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200812-17.xml
vendor-advisory
x_refsource_GENTOO
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/33178
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30988
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
vendor-advisory
x_refsource_APPLE
http://secunia.com/advisories/31011
third-party-advisory
x_refsource_SECUNIA
http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
x_refsource_MISC
http://www.vupen.com/english/advisories/2008/2334
vdb-entry
x_refsource_VUPEN
http://www.securitytracker.com/id?1020577
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31422
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31197
third-party-advisory
x_refsource_SECUNIA
http://www.securitytracker.com/id?1020548
vdb-entry
x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2008/2467
vdb-entry
x_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
vendor-advisory
x_refsource_SUNALERT
http://www.us-cert.gov/cas/techalerts/TA08-190B.html
third-party-advisory
x_refsource_CERT
http://www.us-cert.gov/cas/techalerts/TA08-190A.html
third-party-advisory
x_refsource_CERT
http://security.gentoo.org/glsa/glsa-200807-08.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/31022
third-party-advisory
x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
vendor-advisory
x_refsource_SLACKWARE
http://www.securitytracker.com/id?1020449
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31093
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31052
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30980
third-party-advisory
x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
vendor-advisory
x_refsource_SLACKWARE
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
x_refsource_CONFIRM
http://secunia.com/advisories/31199
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2030/references
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/2291
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/2023/references
vdb-entry
x_refsource_VUPEN
http://marc.info/?l=bugtraq&m=123324863916385&w=2
vendor-advisory
x_refsource_HP
http://www.vupen.com/english/advisories/2008/2466
vdb-entry
x_refsource_VUPEN
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
vendor-advisory
x_refsource_MS
http://secunia.com/advisories/31212
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2113/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31152
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2019/references
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/2197/references
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securitytracker.com/id?1020438
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.kb.cert.org/vuls/id/800113
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: http://secunia.com/advisories/31137
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31430
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31169
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.phys.uu.nl/~rombouts/pdnsd.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securitytracker.com/id?1020702
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://security.gentoo.org/glsa/glsa-201209-25.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.vupen.com/english/advisories/2008/2052/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securitytracker.com/id?1020561
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0014.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141879471518471&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.securitytracker.com/id?1020578
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.securitytracker.com/id?1020802
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://marc.info/?l=bugtraq&m=123324863916385&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.securityfocus.com/bid/30131
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.openbsd.org/errata42.html#013_bind
Resource:
vendor-advisory
x_refsource_OPENBSD
Hyperlink: http://secunia.com/advisories/31236
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://www.securitytracker.com/id?1020651
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.securitytracker.com/id?1020437
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31209
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31012
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31151
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2050/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://support.citrix.com/article/CTX117991
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141879471518471&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/31237
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://secunia.com/advisories/31495
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://www.exploit-db.com/exploits/6130
Resource:
exploit
x_refsource_EXPLOIT-DB
Hyperlink: http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: http://www.securitytracker.com/id?1020579
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.nominum.com/asset_upload_file741_2661.pdf
Resource:
x_refsource_MISC
Hyperlink: http://www.securitytracker.com/id?1020653
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/30998
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2008/dsa-1603
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.vupen.com/english/advisories/2008/2525
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/31094
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://secunia.com/advisories/31687
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2025/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-260A.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://secunia.com/advisories/31588
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31019
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2029/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://marc.info/?l=bugtraq&m=121630706004256&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: https://www.exploit-db.com/exploits/6123
Resource:
exploit
x_refsource_EXPLOIT-DB
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://www.vupen.com/english/advisories/2008/2268
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2009/0297
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://marc.info/?l=bugtraq&m=121630706004256&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/31207
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31031
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2584
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31451
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2051/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/30977
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0789.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.vupen.com/english/advisories/2008/2377
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.securitytracker.com/id?1020558
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31221
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://rhn.redhat.com/errata/RHSA-2008-0533.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.openbsd.org/errata43.html#004_bind
Resource:
vendor-advisory
x_refsource_OPENBSD
Hyperlink: http://www.securitytracker.com/id?1020804
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31143
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/495289/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.vupen.com/english/advisories/2008/2195/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2008/2196/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/33714
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=121866517322103&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/33786
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securitytracker.com/id?1020448
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31882
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2384
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://up2date.astaro.com/2008/08/up2date_7202_released.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2008/2123/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://support.apple.com/kb/HT3026
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31014
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30979
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securitytracker.com/id?1020575
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2008/2482
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://support.apple.com/kb/HT3129
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.debian.org/security/2008/dsa-1619
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.vupen.com/english/advisories/2008/2166/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31072
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2139/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.vupen.com/english/advisories/2008/2092/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31482
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/30989
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2055/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.ipcop.org/index.php?name=News&file=article&sid=40
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31065
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31254
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/495869/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.doxpara.com/?p=1176
Resource:
x_refsource_MISC
Hyperlink: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
Resource:
vendor-advisory
x_refsource_NETBSD
Hyperlink: http://www.ubuntu.com/usn/usn-627-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.vupen.com/english/advisories/2010/0622
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securitytracker.com/id?1020576
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.isc.org/index.pl?/sw/bind/bind-security.php
Resource:
x_refsource_CONFIRM
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/31153
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2008/2549
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31213
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31030
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ubuntu.com/usn/usn-622-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://secunia.com/advisories/31033
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
Resource:
x_refsource_MISC
Hyperlink: http://www.securitytracker.com/id?1020440
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://www.doxpara.com/DMK_BO2K8.ppt
Resource:
x_refsource_MISC
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://www.debian.org/security/2008/dsa-1604
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/31823
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31326
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2558
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://www.exploit-db.com/exploits/6122
Resource:
exploit
x_refsource_EXPLOIT-DB
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
Resource:
x_refsource_MISC
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.vupen.com/english/advisories/2008/2383
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securitytracker.com/id?1020560
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31900
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.citrix.com/article/CTX118183
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/30925
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2009/0311
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.debian.org/security/2008/dsa-1623
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.vupen.com/english/advisories/2008/2582
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
Resource:
x_refsource_MISC
Hyperlink: http://www.debian.org/security/2008/dsa-1605
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.novell.com/support/viewContent.do?externalId=7000912
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2008/2342
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2008/2114/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/30973
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31204
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31354
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://security.gentoo.org/glsa/glsa-200812-17.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/33178
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30988
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://secunia.com/advisories/31011
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
Resource:
x_refsource_MISC
Hyperlink: http://www.vupen.com/english/advisories/2008/2334
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securitytracker.com/id?1020577
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31422
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31197
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securitytracker.com/id?1020548
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.vupen.com/english/advisories/2008/2467
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-190B.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-190A.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://security.gentoo.org/glsa/glsa-200807-08.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/31022
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://www.securitytracker.com/id?1020449
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31093
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31052
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30980
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31199
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2030/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2008/2291
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2008/2023/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://marc.info/?l=bugtraq&m=123324863916385&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.vupen.com/english/advisories/2008/2466
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
Resource:
vendor-advisory
x_refsource_MS
Hyperlink: http://secunia.com/advisories/31212
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2113/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31152
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2019/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2008/2197/references
Resource:
vdb-entry
x_refsource_VUPEN
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securitytracker.com/id?1020438
vdb-entry
x_refsource_SECTRACK
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.kb.cert.org/vuls/id/800113
third-party-advisory
x_refsource_CERT-VN
x_transferred
http://secunia.com/advisories/31137
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31430
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31169
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.phys.uu.nl/~rombouts/pdnsd.html
x_refsource_CONFIRM
x_transferred
http://www.securitytracker.com/id?1020702
vdb-entry
x_refsource_SECTRACK
x_transferred
http://security.gentoo.org/glsa/glsa-201209-25.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.vupen.com/english/advisories/2008/2052/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securitytracker.com/id?1020561
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.vmware.com/security/advisories/VMSA-2008-0014.html
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141879471518471&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.securitytracker.com/id?1020578
vdb-entry
x_refsource_SECTRACK
x_transferred
http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.securitytracker.com/id?1020802
vdb-entry
x_refsource_SECTRACK
x_transferred
http://marc.info/?l=bugtraq&m=123324863916385&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.securityfocus.com/bid/30131
vdb-entry
x_refsource_BID
x_transferred
http://www.openbsd.org/errata42.html#013_bind
vendor-advisory
x_refsource_OPENBSD
x_transferred
http://secunia.com/advisories/31236
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://www.securitytracker.com/id?1020651
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.securitytracker.com/id?1020437
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31209
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31012
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31151
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2050/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://support.citrix.com/article/CTX117991
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141879471518471&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/31237
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
x_refsource_CONFIRM
x_transferred
http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
vendor-advisory
x_refsource_APPLE
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
vdb-entry
x_refsource_XF
x_transferred
http://secunia.com/advisories/31495
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://www.exploit-db.com/exploits/6130
exploit
x_refsource_EXPLOIT-DB
x_transferred
http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
vendor-advisory
x_refsource_CISCO
x_transferred
http://www.securitytracker.com/id?1020579
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.nominum.com/asset_upload_file741_2661.pdf
x_refsource_MISC
x_transferred
http://www.securitytracker.com/id?1020653
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/30998
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.debian.org/security/2008/dsa-1603
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.vupen.com/english/advisories/2008/2525
vdb-entry
x_refsource_VUPEN
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/31094
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://secunia.com/advisories/31687
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2025/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.us-cert.gov/cas/techalerts/TA08-260A.html
third-party-advisory
x_refsource_CERT
x_transferred
http://secunia.com/advisories/31588
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31019
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2029/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://marc.info/?l=bugtraq&m=121630706004256&w=2
vendor-advisory
x_refsource_HP
x_transferred
https://www.exploit-db.com/exploits/6123
exploit
x_refsource_EXPLOIT-DB
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
vendor-advisory
x_refsource_AIXAPAR
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://www.vupen.com/english/advisories/2008/2268
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2009/0297
vdb-entry
x_refsource_VUPEN
x_transferred
http://marc.info/?l=bugtraq&m=121630706004256&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/31207
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31031
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2584
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31451
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2051/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/30977
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0789.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.vupen.com/english/advisories/2008/2377
vdb-entry
x_refsource_VUPEN
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
vendor-advisory
x_refsource_HP
x_transferred
http://www.securitytracker.com/id?1020558
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31221
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://rhn.redhat.com/errata/RHSA-2008-0533.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.openbsd.org/errata43.html#004_bind
vendor-advisory
x_refsource_OPENBSD
x_transferred
http://www.securitytracker.com/id?1020804
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31143
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/495289/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.vupen.com/english/advisories/2008/2195/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2008/2196/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/33714
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=121866517322103&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/33786
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securitytracker.com/id?1020448
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31882
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2384
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://up2date.astaro.com/2008/08/up2date_7202_released.html
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2008/2123/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://support.apple.com/kb/HT3026
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31014
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30979
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securitytracker.com/id?1020575
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2008/2482
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://support.apple.com/kb/HT3129
x_refsource_CONFIRM
x_transferred
http://www.debian.org/security/2008/dsa-1619
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.vupen.com/english/advisories/2008/2166/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31072
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2139/references
vdb-entry
x_refsource_VUPEN
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.vupen.com/english/advisories/2008/2092/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31482
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
vendor-advisory
x_refsource_MANDRIVA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/30989
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2055/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
vendor-advisory
x_refsource_HP
x_transferred
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
x_refsource_CONFIRM
x_transferred
http://www.ipcop.org/index.php?name=News&file=article&sid=40
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31065
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31254
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/495869/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.doxpara.com/?p=1176
x_refsource_MISC
x_transferred
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
vendor-advisory
x_refsource_NETBSD
x_transferred
http://www.ubuntu.com/usn/usn-627-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.vupen.com/english/advisories/2010/0622
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securitytracker.com/id?1020576
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.isc.org/index.pl?/sw/bind/bind-security.php
x_refsource_CONFIRM
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/31153
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2008/2549
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31213
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31030
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ubuntu.com/usn/usn-622-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://secunia.com/advisories/31033
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
x_refsource_MISC
x_transferred
http://www.securitytracker.com/id?1020440
vdb-entry
x_refsource_SECTRACK
x_transferred
http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://www.doxpara.com/DMK_BO2K8.ppt
x_refsource_MISC
x_transferred
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
mailing-list
x_refsource_FULLDISC
x_transferred
http://www.debian.org/security/2008/dsa-1604
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/31823
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31326
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2558
vdb-entry
x_refsource_VUPEN
x_transferred
https://www.exploit-db.com/exploits/6122
exploit
x_refsource_EXPLOIT-DB
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
x_refsource_MISC
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
vdb-entry
x_refsource_XF
x_transferred
http://www.vupen.com/english/advisories/2008/2383
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securitytracker.com/id?1020560
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31900
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
x_refsource_CONFIRM
x_transferred
http://support.citrix.com/article/CTX118183
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/30925
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2009/0311
vdb-entry
x_refsource_VUPEN
x_transferred
http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
x_refsource_CONFIRM
x_transferred
http://www.debian.org/security/2008/dsa-1623
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.vupen.com/english/advisories/2008/2582
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
x_refsource_MISC
x_transferred
http://www.debian.org/security/2008/dsa-1605
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.novell.com/support/viewContent.do?externalId=7000912
x_refsource_CONFIRM
x_transferred
http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2008/2342
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2008/2114/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/30973
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31204
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31354
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://security.gentoo.org/glsa/glsa-200812-17.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/33178
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30988
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://secunia.com/advisories/31011
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
x_refsource_MISC
x_transferred
http://www.vupen.com/english/advisories/2008/2334
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securitytracker.com/id?1020577
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31422
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31197
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securitytracker.com/id?1020548
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.vupen.com/english/advisories/2008/2467
vdb-entry
x_refsource_VUPEN
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.us-cert.gov/cas/techalerts/TA08-190B.html
third-party-advisory
x_refsource_CERT
x_transferred
http://www.us-cert.gov/cas/techalerts/TA08-190A.html
third-party-advisory
x_refsource_CERT
x_transferred
http://security.gentoo.org/glsa/glsa-200807-08.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/31022
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://www.securitytracker.com/id?1020449
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31093
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31052
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30980
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31199
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2030/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2008/2291
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2008/2023/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://marc.info/?l=bugtraq&m=123324863916385&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.vupen.com/english/advisories/2008/2466
vdb-entry
x_refsource_VUPEN
x_transferred
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
vendor-advisory
x_refsource_MS
x_transferred
http://secunia.com/advisories/31212
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2113/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31152
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2019/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2008/2197/references
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020438
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/800113
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: http://secunia.com/advisories/31137
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31430
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31169
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.phys.uu.nl/~rombouts/pdnsd.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020702
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-201209-25.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2052/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020561
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0014.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141879471518471&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020578
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020802
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=123324863916385&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.securityfocus.com/bid/30131
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.openbsd.org/errata42.html#013_bind
Resource:
vendor-advisory
x_refsource_OPENBSD
x_transferred
Hyperlink: http://secunia.com/advisories/31236
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020651
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020437
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31209
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31012
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31151
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2050/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://support.citrix.com/article/CTX117991
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141879471518471&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/31237
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://secunia.com/advisories/31495
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://www.exploit-db.com/exploits/6130
Resource:
exploit
x_refsource_EXPLOIT-DB
x_transferred
Hyperlink: http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020579
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.nominum.com/asset_upload_file741_2661.pdf
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020653
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/30998
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1603
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2525
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/31094
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://secunia.com/advisories/31687
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2025/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-260A.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://secunia.com/advisories/31588
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31019
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2029/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=121630706004256&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: https://www.exploit-db.com/exploits/6123
Resource:
exploit
x_refsource_EXPLOIT-DB
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2268
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/0297
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=121630706004256&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/31207
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31031
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2584
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31451
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2051/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/30977
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0789.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2377
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020558
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31221
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2008-0533.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.openbsd.org/errata43.html#004_bind
Resource:
vendor-advisory
x_refsource_OPENBSD
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020804
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31143
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/495289/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2195/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2196/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/33714
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=121866517322103&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/33786
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020448
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31882
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2384
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://up2date.astaro.com/2008/08/up2date_7202_released.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2123/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://support.apple.com/kb/HT3026
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31014
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30979
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020575
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2482
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://support.apple.com/kb/HT3129
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1619
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2166/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31072
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2139/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2092/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31482
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/30989
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2055/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.ipcop.org/index.php?name=News&file=article&sid=40
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31065
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31254
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/495869/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.doxpara.com/?p=1176
Resource:
x_refsource_MISC
x_transferred
Hyperlink: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
Resource:
vendor-advisory
x_refsource_NETBSD
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-627-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2010/0622
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020576
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.isc.org/index.pl?/sw/bind/bind-security.php
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/31153
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2549
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31213
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31030
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-622-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://secunia.com/advisories/31033
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020440
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://www.doxpara.com/DMK_BO2K8.ppt
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1604
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/31823
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31326
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2558
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://www.exploit-db.com/exploits/6122
Resource:
exploit
x_refsource_EXPLOIT-DB
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2383
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020560
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31900
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.citrix.com/article/CTX118183
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/30925
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/0311
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1623
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2582
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1605
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.novell.com/support/viewContent.do?externalId=7000912
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2342
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2114/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/30973
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31204
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31354
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200812-17.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/33178
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30988
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://secunia.com/advisories/31011
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2334
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020577
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31422
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31197
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020548
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2467
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-190B.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-190A.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200807-08.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/31022
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020449
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31093
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31052
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30980
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31199
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2030/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2291
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2023/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=123324863916385&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2466
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
Resource:
vendor-advisory
x_refsource_MS
x_transferred
Hyperlink: http://secunia.com/advisories/31212
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2113/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31152
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2019/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2197/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@microsoft.com
Published At:08 Jul, 2008 | 23:41
Updated At:24 Mar, 2020 | 18:19

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.8MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
Type: Primary
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N
CPE Matches

Canonical Ltd.
canonical
>>ubuntu_linux>>6.06
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>7.04
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>7.10
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>8.04
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>12.0
cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>4.0
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_2000>>*
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*
Microsoft Corporation
microsoft
>>windows_xp>>*
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_xp>>-
cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*
Microsoft Corporation
microsoft
>>windows_xp>>-
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>2.1
cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>2.1
cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>2.1
cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>5
cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>5
cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>5.0
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>4
cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>8
cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.9
cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-331Primarynvd@nist.gov
CWE ID: CWE-331
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2008-07-09T00:00:00

http://rhn.redhat.com/errata/RHSA-2008-0533.html

References
HyperlinkSourceResource
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.ascsecure@microsoft.com
Third Party Advisory
Vendor Advisory
http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.htmlsecure@microsoft.com
Technical Description
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401secure@microsoft.com
Third Party Advisory
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520secure@microsoft.com
Broken Link
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368secure@microsoft.com
Broken Link
http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.htmlsecure@microsoft.com
Mailing List
Third Party Advisory
http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.htmlsecure@microsoft.com
Mailing List
Third Party Advisory
http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.htmlsecure@microsoft.com
Mailing List
Third Party Advisory
http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.htmlsecure@microsoft.com
Mailing List
Third Party Advisory
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.htmlsecure@microsoft.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.htmlsecure@microsoft.com
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.htmlsecure@microsoft.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=121630706004256&w=2secure@microsoft.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=121866517322103&w=2secure@microsoft.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=123324863916385&w=2secure@microsoft.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=141879471518471&w=2secure@microsoft.com
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2008-0533.htmlsecure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/30925secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/30973secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/30977secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/30979secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/30980secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/30988secure@microsoft.com
Third Party Advisory
Vendor Advisory
http://secunia.com/advisories/30989secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/30998secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31011secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31012secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31014secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31019secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31022secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31030secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31031secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31033secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/31052secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/31065secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31072secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31093secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31094secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/31137secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/31143secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31151secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31152secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31153secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31169secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31197secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/31199secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31204secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31207secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/31209secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31212secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31213secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31221secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31236secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31237secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/31254secure@microsoft.com
Vendor Advisory
http://secunia.com/advisories/31326secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31354secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31422secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31430secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31451secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31482secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31495secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31588secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31687secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31823secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31882secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/31900secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/33178secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/33714secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/33786secure@microsoft.com
Third Party Advisory
http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.ascsecure@microsoft.com
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200807-08.xmlsecure@microsoft.com
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200812-17.xmlsecure@microsoft.com
Third Party Advisory
http://security.gentoo.org/glsa/glsa-201209-25.xmlsecure@microsoft.com
Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680secure@microsoft.com
Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239secure@microsoft.com
Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1secure@microsoft.com
Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1secure@microsoft.com
Third Party Advisory
http://support.apple.com/kb/HT3026secure@microsoft.com
Third Party Advisory
http://support.apple.com/kb/HT3129secure@microsoft.com
Third Party Advisory
http://support.citrix.com/article/CTX117991secure@microsoft.com
Third Party Advisory
http://support.citrix.com/article/CTX118183secure@microsoft.com
Third Party Advisory
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152secure@microsoft.com
Third Party Advisory
http://up2date.astaro.com/2008/08/up2date_7202_released.htmlsecure@microsoft.com
Third Party Advisory
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231secure@microsoft.com
Third Party Advisory
http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018secure@microsoft.com
Third Party Advisory
http://www.bluecoat.com/support/security-advisories/dns_cache_poisoningsecure@microsoft.com
Third Party Advisory
http://www.caughq.org/exploits/CAU-EX-2008-0002.txtsecure@microsoft.com
Third Party Advisory
http://www.caughq.org/exploits/CAU-EX-2008-0003.txtsecure@microsoft.com
Third Party Advisory
http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtmlsecure@microsoft.com
Third Party Advisory
http://www.debian.org/security/2008/dsa-1603secure@microsoft.com
Patch
http://www.debian.org/security/2008/dsa-1604secure@microsoft.com
Third Party Advisory
http://www.debian.org/security/2008/dsa-1605secure@microsoft.com
Third Party Advisory
http://www.debian.org/security/2008/dsa-1619secure@microsoft.com
Third Party Advisory
http://www.debian.org/security/2008/dsa-1623secure@microsoft.com
Third Party Advisory
http://www.doxpara.com/?p=1176secure@microsoft.com
Third Party Advisory
http://www.doxpara.com/DMK_BO2K8.pptsecure@microsoft.com
Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ26667secure@microsoft.com
Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ26668secure@microsoft.com
Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ26669secure@microsoft.com
Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ26670secure@microsoft.com
Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ26671secure@microsoft.com
Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ26672secure@microsoft.com
Third Party Advisory
http://www.ipcop.org/index.php?name=News&file=article&sid=40secure@microsoft.com
Third Party Advisory
http://www.isc.org/index.pl?/sw/bind/bind-security.phpsecure@microsoft.com
Third Party Advisory
http://www.kb.cert.org/vuls/id/800113secure@microsoft.com
Third Party Advisory
US Government Resource
http://www.kb.cert.org/vuls/id/MIMG-7DWR4Jsecure@microsoft.com
Third Party Advisory
US Government Resource
http://www.kb.cert.org/vuls/id/MIMG-7ECL8Qsecure@microsoft.com
Third Party Advisory
US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2008:139secure@microsoft.com
Third Party Advisory
http://www.nominum.com/asset_upload_file741_2661.pdfsecure@microsoft.com
Third Party Advisory
http://www.novell.com/support/viewContent.do?externalId=7000912secure@microsoft.com
Third Party Advisory
http://www.openbsd.org/errata42.html#013_bindsecure@microsoft.com
Third Party Advisory
http://www.openbsd.org/errata43.html#004_bindsecure@microsoft.com
Third Party Advisory
http://www.phys.uu.nl/~rombouts/pdnsd.htmlsecure@microsoft.com
Third Party Advisory
http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLogsecure@microsoft.com
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-0789.htmlsecure@microsoft.com
Third Party Advisory
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.htmlsecure@microsoft.com
Third Party Advisory
http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/secure@microsoft.com
Third Party Advisory
http://www.securityfocus.com/archive/1/495289/100/0/threadedsecure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/495869/100/0/threadedsecure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/30131secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020437secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020438secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020440secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020448secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020449secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020548secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020558secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020560secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020561secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020575secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020576secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020577secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020578secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020579secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020651secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020653secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020702secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020802secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020804secure@microsoft.com
Third Party Advisory
VDB Entry
http://www.ubuntu.com/usn/usn-622-1secure@microsoft.com
Third Party Advisory
http://www.ubuntu.com/usn/usn-627-1secure@microsoft.com
Third Party Advisory
http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.htmlsecure@microsoft.com
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA08-190A.htmlsecure@microsoft.com
Third Party Advisory
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA08-190B.htmlsecure@microsoft.com
Third Party Advisory
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA08-260A.htmlsecure@microsoft.com
Third Party Advisory
US Government Resource
http://www.vmware.com/security/advisories/VMSA-2008-0014.htmlsecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2019/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2023/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2025/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2029/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2030/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2050/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2051/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2052/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2055/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2092/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2113/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2114/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2123/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2139/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2166/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2195/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2196/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2197/referencessecure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2268secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2291secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2334secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2342secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2377secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2383secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2384secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2466secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2467secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2482secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2525secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2549secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2558secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2582secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/2584secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2009/0297secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2009/0311secure@microsoft.com
Third Party Advisory
http://www.vupen.com/english/advisories/2010/0622secure@microsoft.com
Third Party Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037secure@microsoft.com
Patch
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/43334secure@microsoft.com
Third Party Advisory
VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/43637secure@microsoft.com
Third Party Advisory
VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117secure@microsoft.com
Tool Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725secure@microsoft.com
Tool Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761secure@microsoft.com
Tool Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917secure@microsoft.com
Tool Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627secure@microsoft.com
Tool Signature
https://www.exploit-db.com/exploits/6122secure@microsoft.com
Third Party Advisory
VDB Entry
https://www.exploit-db.com/exploits/6123secure@microsoft.com
Third Party Advisory
VDB Entry
https://www.exploit-db.com/exploits/6130secure@microsoft.com
Third Party Advisory
VDB Entry
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.htmlsecure@microsoft.com
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.htmlsecure@microsoft.com
Third Party Advisory
Hyperlink: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
Source: secure@microsoft.com
Resource:
Third Party Advisory
Vendor Advisory
Hyperlink: http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
Source: secure@microsoft.com
Resource:
Technical Description
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
Source: secure@microsoft.com
Resource:
Broken Link
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
Source: secure@microsoft.com
Resource:
Broken Link
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
Source: secure@microsoft.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
Source: secure@microsoft.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
Source: secure@microsoft.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
Source: secure@microsoft.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Source: secure@microsoft.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=121630706004256&w=2
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=121866517322103&w=2
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=123324863916385&w=2
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=141879471518471&w=2
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://rhn.redhat.com/errata/RHSA-2008-0533.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/30925
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/30973
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/30977
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/30979
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/30980
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/30988
Source: secure@microsoft.com
Resource:
Third Party Advisory
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30989
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30998
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31011
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31012
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31014
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31019
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31022
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31030
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31031
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31033
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31052
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31065
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31072
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31093
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31094
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31137
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31143
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31151
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31152
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31153
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31169
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31197
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31199
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31204
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31207
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31209
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31212
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31213
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31221
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31236
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31237
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31254
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31326
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31354
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31422
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31430
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31451
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31482
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31495
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31588
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31687
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31823
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31882
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31900
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/33178
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/33714
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/33786
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://security.gentoo.org/glsa/glsa-200807-08.xml
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://security.gentoo.org/glsa/glsa-200812-17.xml
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://security.gentoo.org/glsa/glsa-201209-25.xml
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://support.apple.com/kb/HT3026
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://support.apple.com/kb/HT3129
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://support.citrix.com/article/CTX117991
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://support.citrix.com/article/CTX118183
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://up2date.astaro.com/2008/08/up2date_7202_released.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.debian.org/security/2008/dsa-1603
Source: secure@microsoft.com
Resource:
Patch
Hyperlink: http://www.debian.org/security/2008/dsa-1604
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.debian.org/security/2008/dsa-1605
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.debian.org/security/2008/dsa-1619
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.debian.org/security/2008/dsa-1623
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.doxpara.com/?p=1176
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.doxpara.com/DMK_BO2K8.ppt
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.ipcop.org/index.php?name=News&file=article&sid=40
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.isc.org/index.pl?/sw/bind/bind-security.php
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.kb.cert.org/vuls/id/800113
Source: secure@microsoft.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
Source: secure@microsoft.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
Source: secure@microsoft.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.nominum.com/asset_upload_file741_2661.pdf
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.novell.com/support/viewContent.do?externalId=7000912
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.openbsd.org/errata42.html#013_bind
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.openbsd.org/errata43.html#004_bind
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.phys.uu.nl/~rombouts/pdnsd.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0789.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.securityfocus.com/archive/1/495289/100/0/threaded
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/archive/1/495869/100/0/threaded
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/30131
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020437
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020438
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020440
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020448
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020449
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020548
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020558
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020560
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020561
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020575
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020576
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020577
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020578
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020579
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020651
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020653
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020702
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020802
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1020804
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.ubuntu.com/usn/usn-622-1
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.ubuntu.com/usn/usn-627-1
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-190A.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-190B.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-260A.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0014.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2019/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2023/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2025/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2029/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2030/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2050/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2051/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2052/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2055/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2092/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2113/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2114/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2123/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2139/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2166/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2195/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2196/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2197/references
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2268
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2291
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2334
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2342
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2377
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2383
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2384
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2466
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2467
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2482
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2525
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2549
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2558
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2582
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2584
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2009/0297
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2009/0311
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2010/0622
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
Source: secure@microsoft.com
Resource:
Patch
Vendor Advisory
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
Source: secure@microsoft.com
Resource:
Tool Signature
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
Source: secure@microsoft.com
Resource:
Tool Signature
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
Source: secure@microsoft.com
Resource:
Tool Signature
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
Source: secure@microsoft.com
Resource:
Tool Signature
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
Source: secure@microsoft.com
Resource:
Tool Signature
Hyperlink: https://www.exploit-db.com/exploits/6122
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www.exploit-db.com/exploits/6123
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www.exploit-db.com/exploits/6130
Source: secure@microsoft.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
Source: secure@microsoft.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

594Records found

CVE-2019-1982
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.29% / 52.41%
||
7 Day CHG~0.00%
Published-05 Nov, 2019 | 19:35
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Threat Defense Software HTTP Filtering Bypass Vulnerability

A vulnerability in the HTTP traffic filtering component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper handling of HTTP requests, including those communicated over a secure HTTPS connection, that contain maliciously crafted headers. An attacker could exploit this vulnerability by sending malicious requests to an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems, allowing attackers to deliver malicious content that would otherwise be blocked.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerfirepower_services_software_for_asafirepower_threat_defenseCisco Firepower Management Center
CWE ID-CWE-264
Not Available
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2019-1951
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.24% / 46.54%
||
7 Day CHG~0.00%
Published-08 Aug, 2019 | 07:25
Updated-19 Nov, 2024 | 19:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN Solution Packet Filtering Bypass Vulnerability

A vulnerability in the packet filtering features of Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to bypass L3 and L4 traffic filters. The vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by crafting a malicious TCP packet with specific characteristics and sending it to a target device. A successful exploit could allow the attacker to bypass the L3 and L4 traffic filters and inject an arbitrary packet in the network.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sd-wan_firmwareCisco SD-WAN Solution
CWE ID-CWE-20
Improper Input Validation
CVE-2019-1921
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.21% / 43.89%
||
7 Day CHG~0.00%
Published-06 Jul, 2019 | 01:25
Updated-19 Nov, 2024 | 19:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Email Security Appliance Content Filter Bypass Vulnerability

A vulnerability in the attachment scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured content filters on the device. The vulnerability is due to improper input validation of the email body. An attacker could exploit this vulnerability by naming a malicious attachment with a specific pattern. A successful exploit could allow the attacker to bypass configured content filters that would normally block the attachment.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-email_security_applianceCisco Email Security Appliance (ESA)
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12165
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-2.6||LOW
EPSS-1.10% / 78.04%
||
7 Day CHG~0.00%
Published-27 Jul, 2018 | 15:00
Updated-05 Aug, 2024 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was discovered that Undertow before 1.4.17, 1.3.31 and 2.0.0 processes http request headers with unusual whitespaces which can cause possible http request smuggling.

Action-Not Available
Vendor-Red Hat, Inc.
Product-jboss_enterprise_application_platformundertowundertow
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2017-0129
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-1.74% / 82.53%
||
7 Day CHG~0.00%
Published-17 Mar, 2017 | 00:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Lync for Mac 2011 fails to properly validate certificates, allowing remote attackers to alter server-client communications, aka "Microsoft Lync for Mac Certificate Validation Vulnerability."

Action-Not Available
Vendor-Microsoft Corporation
Product-lync_for_macLync for Mac
CWE ID-CWE-295
Improper Certificate Validation
CVE-2019-1970
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.07% / 22.48%
||
7 Day CHG~0.00%
Published-08 Aug, 2019 | 07:35
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Threat Defense Software File Policy Bypass Vulnerability

A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol inspection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the configured file policies on an affected system. The vulnerability is due to errors when handling specific SSL/TLS messages. An attacker could exploit this vulnerability by sending crafted HTTP packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured file policies and deliver a malicious payload to the protected network.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerfirepower_threat_defenseCisco Firepower Threat Defense Software
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2019-18848
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.06%
||
7 Day CHG~0.00%
Published-12 Nov, 2019 | 14:23
Updated-05 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The json-jwt gem before 1.11.0 for Ruby lacks an element count during the splitting of a JWE string.

Action-Not Available
Vendor-json-jwt_projectn/aDebian GNU/Linux
Product-debian_linuxjson-jwtn/a
CWE ID-CWE-287
Improper Authentication
CVE-2019-18678
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-9.96% / 93.05%
||
7 Day CHG~0.00%
Published-26 Nov, 2019 | 16:15
Updated-05 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Squid 3.x and 4.x through 4.8. It allows attackers to smuggle HTTP requests through frontend software to a Squid instance that splits the HTTP Request pipeline differently. The resulting Response messages corrupt caches (between a client and Squid) with attacker-controlled content at arbitrary URLs. Effects are isolated to software between the attacker client and Squid. There are no effects on Squid itself, nor on any upstream servers. The issue is related to a request header containing whitespace between a header name and a colon.

Action-Not Available
Vendor-n/aDebian GNU/LinuxSquid CacheCanonical Ltd.Fedora Project
Product-ubuntu_linuxdebian_linuxfedorasquidn/a
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2019-1876
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4||MEDIUM
EPSS-1.97% / 83.56%
||
7 Day CHG~0.00%
Published-20 Jun, 2019 | 03:00
Updated-21 Nov, 2024 | 19:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Wide Area Application Services Software HTTPS Proxy Authentication Bypass Vulnerability

A vulnerability in the HTTPS proxy feature of Cisco Wide Area Application Services (WAAS) Software could allow an unauthenticated, remote attacker to use the Central Manager as an HTTPS proxy. The vulnerability is due to insufficient authentication of proxy connection requests. An attacker could exploit this vulnerability by sending a malicious HTTPS CONNECT message to the Central Manager. A successful exploit could allow the attacker to access public internet resources that would normally be blocked by corporate policies.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-wide_area_application_servicesCisco Wide Area Application Services (WAAS)
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-1955
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.21% / 43.89%
||
7 Day CHG~0.00%
Published-08 Aug, 2019 | 07:30
Updated-19 Nov, 2024 | 19:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Email Security Appliance Header Injection Vulnerability

A vulnerability in the Sender Policy Framework (SPF) functionality of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. The vulnerability is due to incomplete input and validation checking mechanisms for certain SPF messages that are sent to an affected device. An attacker could exploit this vulnerability by sending a customized SPF packet to an affected device. A successful exploit could allow the attacker to bypass the header filters that are configured for the affected device, which could allow malicious content to pass through the device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-email_security_appliance_firmwareCisco Email Security Appliance (ESA)
CWE ID-CWE-20
Improper Input Validation
CVE-2019-1872
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.32% / 54.79%
||
7 Day CHG~0.00%
Published-05 Jun, 2019 | 16:30
Updated-19 Nov, 2024 | 19:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco TelePresence Video Communication Server and Cisco Expressway Series Server-Side Request Forgery Vulnerability

A vulnerability in Cisco TelePresence Video Communication Server (VCS) and Cisco Expressway Series software could allow an unauthenticated, remote attacker to cause an affected system to send arbitrary network requests. The vulnerability is due to improper restrictions on network services in the affected software. An attacker could exploit this vulnerability by sending malicious requests to the affected system. A successful exploit could allow the attacker to send arbitrary network requests sourced from the affected system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-telepresence_video_communication_serverCisco TelePresence Video Communication Server (VCS)
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2021-26119
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-62.61% / 98.38%
||
7 Day CHG~0.00%
Published-22 Feb, 2021 | 01:34
Updated-03 Aug, 2024 | 20:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode.

Action-Not Available
Vendor-smartyn/aDebian GNU/Linux
Product-smartydebian_linuxn/a
CVE-2019-1905
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.15% / 35.13%
||
7 Day CHG~0.00%
Published-20 Jun, 2019 | 03:10
Updated-19 Nov, 2024 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Email Security Appliance GZIP Content Filter Bypass Vulnerability

A vulnerability in the GZIP decompression engine of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured content filters on the device. The vulnerability is due to improper validation of GZIP-formatted files. An attacker could exploit this vulnerability by sending a malicious file inside a crafted GZIP-compressed file. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-email_security_applianceCisco Email Security Appliance (ESA)
CWE ID-CWE-20
Improper Input Validation
CVE-2019-18625
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.25% / 48.73%
||
7 Day CHG~0.00%
Published-06 Jan, 2020 | 20:09
Updated-22 Oct, 2024 | 17:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Suricata 5.0.0. It was possible to bypass/evade any tcp based signature by faking a closed TCP session using an evil server. After the TCP SYN packet, it is possible to inject a RST ACK and a FIN ACK packet with a bad TCP Timestamp option. The client will ignore the RST ACK and the FIN ACK packets because of the bad TCP Timestamp option. Both linux and windows client are ignoring the injected packets.

Action-Not Available
Vendor-oisfn/aLinux Kernel Organization, IncDebian GNU/LinuxMicrosoft Corporation
Product-windowsdebian_linuxlinux_kernelsuricatan/a
CVE-2019-1980
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.29% / 52.41%
||
7 Day CHG~0.00%
Published-05 Nov, 2019 | 19:35
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Threat Defense Software Nonstandard Protocol Detection Bypass Vulnerability

A vulnerability in the protocol detection component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper detection of the initial use of a protocol on a nonstandard port. An attacker could exploit this vulnerability by sending traffic on a nonstandard port for the protocol in use through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems that would otherwise be blocked. Once the initial protocol flow on the nonstandard port is detected, future flows on the nonstandard port will be successfully detected and handled as configured by the applied policy.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerfirepower_services_software_for_asafirepower_threat_defenseCisco Firepower Threat Defense Software
CWE ID-CWE-264
Not Available
CWE ID-CWE-287
Improper Authentication
CVE-2017-12309
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.98% / 76.75%
||
7 Day CHG~0.00%
Published-16 Nov, 2017 | 07:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to conduct a HTTP response splitting attack. The vulnerability is due to the failure of the application or its environment to properly sanitize input values. An attacker could exploit this vulnerability by injecting malicious HTTP headers, controlling the response body, or splitting the response into multiple responses. An exploit could allow the attacker to perform cross-site scripting attacks, cross-user defacement, web cache poisoning, and similar exploits. Cisco Bug IDs: CSCvf16705.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-email_security_appliance_firmwareCisco Email Security Appliance
CWE ID-CWE-113
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
CVE-2019-1831
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.16% / 36.34%
||
7 Day CHG~0.00%
Published-18 Apr, 2019 | 01:20
Updated-19 Nov, 2024 | 19:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Email Security Appliance Content Filter Bypass Vulnerability

A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured content filters on the device. The vulnerability is due to improper input validation of the email body. An attacker could exploit this vulnerability by inserting specific character strings in the message. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-email_security_applianceCisco Email Security Appliance (ESA)
CWE ID-CWE-20
Improper Input Validation
CVE-2019-17673
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.57% / 87.75%
||
7 Day CHG~0.00%
Published-17 Oct, 2019 | 12:03
Updated-05 Aug, 2024 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WordPress before 5.2.4 is vulnerable to poisoning of the cache of JSON GET requests because certain requests lack a Vary: Origin header.

Action-Not Available
Vendor-n/aDebian GNU/LinuxWordPress.org
Product-wordpressdebian_linuxn/a
CVE-2019-1844
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.22% / 44.24%
||
7 Day CHG~0.00%
Published-03 May, 2019 | 16:35
Updated-19 Nov, 2024 | 19:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Email Security Appliance Filter Bypass Vulnerability

A vulnerability in certain attachment detection mechanisms of the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the filtering functionality of an affected device. The vulnerability is due to improper detection of certain content sent to an affected device. An attacker could exploit this vulnerability by sending certain file types without Content-Disposition information to an affected device. A successful exploit could allow an attacker to send messages that contain malicious content to users.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-email_security_applianceCisco Email Security Appliance (ESA)
CWE ID-CWE-20
Improper Input Validation
CVE-2019-1832
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.11% / 30.04%
||
7 Day CHG~0.00%
Published-16 May, 2019 | 01:15
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Threat Defense Software Detection Engine Policy Bypass Vulnerability

A vulnerability in the detection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured access control policies. The vulnerability is due to improper validation of ICMP packets. An attacker could exploit this vulnerability by sending crafted ICMP packets to the affected device. A successful exploit could allow the attacker to bypass configured access control policies.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerCisco Firepower Threat Defense Software
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2019-1833
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.25% / 47.98%
||
7 Day CHG~0.00%
Published-16 May, 2019 | 01:20
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Threat Defense Software SSL/TLS Policy Bypass Vulnerability

A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol parser of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies. The vulnerability is due to improper parsing of specific attributes in a TLS packet header. An attacker could exploit this vulnerability by sending malicious TLS messages to the affected system. A successful exploit could allow the attacker to bypass the configured policies for the system, which could allow traffic to flow through without being inspected.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerCisco Firepower Threat Defense Software
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2019-1759
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-28.48% / 96.54%
||
7 Day CHG~0.00%
Published-28 Mar, 2019 | 00:25
Updated-19 Nov, 2024 | 19:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Gigabit Ethernet Management Interface Access Control List Bypass Vulnerability

A vulnerability in access control list (ACL) functionality of the Gigabit Ethernet Management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to reach the configured IP addresses on the Gigabit Ethernet Management interface. The vulnerability is due to a logic error that was introduced in the Cisco IOS XE Software 16.1.1 Release, which prevents the ACL from working when applied against the management interface. An attacker could exploit this issue by attempting to access the device via the management interface.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-287
Improper Authentication
CVE-2019-1686
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.19% / 40.86%
||
7 Day CHG~0.00%
Published-17 Apr, 2019 | 21:50
Updated-19 Nov, 2024 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco ASR 9000 Series Aggregation Services Routers ACL Bypass Vulnerability

A vulnerability in the TCP flags inspection feature for access control lists (ACLs) on Cisco ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass protection offered by a configured ACL on an affected device. The vulnerability is due to incorrect processing of the ACL applied to an interface of an affected device when Cisco Express Forwarding load balancing using the 3-tuple hash algorithm is enabled. An attacker could exploit this vulnerability by sending traffic through an affected device that should otherwise be denied by the configured ACL. An exploit could allow the attacker to bypass protection offered by a configured ACL on the affected device. There are workarounds that address this vulnerability. Affected Cisco IOS XR versions are: Cisco IOS XR Software Release 5.1.1 and later till first fixed. First Fixed Releases: 6.5.2 and later, 6.6.1 and later.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-asr_9000vasr_9910asr_9906asr_9904asr_9006asr_9912asr_9922asr_9010asr_9001ios_xrasr_9901Cisco IOS XR Software
CWE ID-CWE-284
Improper Access Control
CVE-2019-16254
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.71% / 72.20%
||
7 Day CHG~0.00%
Published-26 Nov, 2019 | 00:00
Updated-05 Aug, 2024 | 01:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.

Action-Not Available
Vendor-n/aDebian GNU/LinuxRuby
Product-debian_linuxrubyn/a
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2019-1672
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.18% / 38.97%
||
7 Day CHG~0.00%
Published-08 Feb, 2019 | 18:00
Updated-19 Nov, 2024 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Web Security Appliance Decryption Policy Bypass Vulnerability

A vulnerability in the Decryption Policy Default Action functionality of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured drop policy and allow traffic onto the network that should have been denied. The vulnerability is due to the incorrect handling of SSL-encrypted traffic when Decrypt for End-User Notification is disabled in the configuration. An attacker could exploit this vulnerability by sending a SSL connection through the affected device. A successful exploit could allow the attacker to bypass a configured drop policy to block specific SSL connections. Releases 10.1.x and 10.5.x are affected.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-web_security_applianceCisco Web Security Appliance (WSA)
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2017-12300
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.23% / 45.48%
||
7 Day CHG~0.00%
Published-16 Nov, 2017 | 07:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the SNORT detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass a file policy that is configured to block the Server Message Block Version 2 (SMB2) protocol. The vulnerability is due to the incorrect detection of an SMB2 file when the detection is based on the length of the file. An attacker could exploit this vulnerability by sending a crafted SMB2 transfer request through the targeted device. A successful exploit could allow the attacker to bypass filters that are configured to block SMB2 traffic. Cisco Bug IDs: CSCve58398.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-secure_firewall_management_centerCisco Firepower System Software
CWE ID-CWE-20
Improper Input Validation
CVE-2019-16235
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.27% / 50.00%
||
7 Day CHG~0.00%
Published-11 Sep, 2019 | 18:57
Updated-05 Aug, 2024 | 01:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dino before 2019-09-10 does not properly check the source of a carbons message in module/xep/0280_message_carbons.vala.

Action-Not Available
Vendor-dinon/aCanonical Ltd.Fedora ProjectDebian GNU/Linux
Product-ubuntu_linuxdebian_linuxfedoradinon/a
CWE ID-CWE-346
Origin Validation Error
CVE-2019-16237
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.42% / 62.19%
||
7 Day CHG~0.00%
Published-11 Sep, 2019 | 18:56
Updated-05 Aug, 2024 | 01:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dino before 2019-09-10 does not properly check the source of an MAM message in module/xep/0313_message_archive_management.vala.

Action-Not Available
Vendor-dinon/aCanonical Ltd.Fedora ProjectDebian GNU/Linux
Product-ubuntu_linuxdebian_linuxfedoradinon/a
CWE ID-CWE-346
Origin Validation Error
CVE-2019-1629
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.32% / 54.79%
||
7 Day CHG~0.00%
Published-20 Jun, 2019 | 02:50
Updated-19 Nov, 2024 | 19:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Integrated Management Controller Arbitrary File Write Vulnerability

A vulnerability in the configuration import utility of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to have write access and upload arbitrary data to the filesystem. The vulnerability is due to a failure to delete temporarily uploaded files. An attacker could exploit this vulnerability by crafting a malicious file and uploading it to the affected device. An exploit could allow the attacker to fill up the filesystem or upload malicious scripts.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_computing_systemintegrated_management_controllerCisco Unified Computing System (Management Software)
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2017-12303
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.40% / 60.88%
||
7 Day CHG~0.00%
Published-16 Nov, 2017 | 07:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Advanced Malware Protection (AMP) file filtering feature of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured AMP file filtering rule. The file types affected are zipped or archived file types. The vulnerability is due to incorrect and different file hash values when AMP scans the file. An attacker could exploit this vulnerability by sending a crafted email file attachment through the targeted device. An exploit could allow the attacker to bypass a configured AMP file filter. Cisco Bug IDs: CSCvf52943.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-asyncosCisco Web Security Appliance
CWE ID-CWE-358
Improperly Implemented Security Check for Standard
CVE-2017-12218
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.38% / 59.68%
||
7 Day CHG~0.00%
Published-07 Sep, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the malware detection functionality within Advanced Malware Protection (AMP) of Cisco AsyncOS Software for Cisco Email Security Appliances (ESAs) could allow an unauthenticated, remote attacker to cause an email attachment containing malware to be delivered to the end user. The vulnerability is due to the failure of AMP to scan certain EML attachments that could contain malware. An attacker could exploit this vulnerability by sending an email with a crafted EML attachment through the targeted device. A successful exploit could allow the attacker to bypass the configured ESA email message and content filtering and allow the malware to be delivered to the end user. Vulnerable Products: This vulnerability affects Cisco AsyncOS Software for Cisco ESA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA. Cisco Bug IDs: CSCuz81533.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-asyncosCisco Email Security Appliance
CWE ID-CWE-20
Improper Input Validation
CVE-2019-16276
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-9.84% / 92.99%
||
7 Day CHG+0.69%
Published-30 Sep, 2019 | 18:40
Updated-05 Aug, 2024 | 01:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.

Action-Not Available
Vendor-n/aNetApp, Inc.Fedora ProjectDebian GNU/LinuxGoopenSUSERed Hat, Inc.
Product-debian_linuxdeveloper_toolscloud_insights_telegraf_agentopenshift_container_platformfedoraenterprise_linuxgoenterprise_linux_eusleapn/a
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2019-15988
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.34% / 56.51%
||
7 Day CHG~0.00%
Published-26 Nov, 2019 | 03:42
Updated-19 Nov, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Email Security Appliance URL Filtering Bypass Vulnerability

A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting the URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-email_security_appliance_firmwareCisco Email Security Appliance (ESA)
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12299
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.23% / 45.48%
||
7 Day CHG~0.00%
Published-16 Nov, 2017 | 07:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists in the process of creating default IP blocks during device initialization for Cisco ASA Next-Generation Firewall Services that could allow an unauthenticated, remote attacker to send traffic to the local IP address of the device, bypassing any filters that are configured to deny local IP management traffic. The vulnerability is due to an implementation error that exists in the process of creating default IP blocks when the device is initialized, and the way in which those IP blocks interact with user-configured filters for local IP management traffic (for example, SSH to the device). An attacker could exploit this vulnerability by sending traffic to the local IP address of the targeted device. A successful exploit could allow the attacker to connect to the local IP address of the device even when there are filters configured to deny the traffic. Cisco Bug IDs: CSCvd97962.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-firepower_extensible_operating_systemCisco ASA Next-Generation Firewall Services
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12353
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.38% / 59.68%
||
7 Day CHG~0.00%
Published-30 Nov, 2017 | 09:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. The vulnerability is due to improper error handling of a malformed MIME header in an email attachment. An attacker could exploit this vulnerability by sending an email with a crafted MIME attachment. For example, a successful exploit could allow the attacker to bypass configured user filters to drop the email. The malformed MIME headers may not be RFC compliant. However, some mail clients could still allow users to access the attachment, which may not have been properly filtered by the device. Cisco Bug IDs: CSCvf44666.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-asyncosCisco Email Security Appliance
CWE ID-CWE-254
Not Available
CVE-2019-16869
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-4.03% / 88.50%
||
7 Day CHG~0.00%
Published-26 Sep, 2019 | 15:28
Updated-07 Jul, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Netty before 4.1.42.Final mishandles whitespace before the colon in HTTP headers (such as a "Transfer-Encoding : chunked" line), which leads to HTTP request smuggling.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.The Netty ProjectRed Hat, Inc.
Product-nettyubuntu_linuxjboss_enterprise_application_platformdebian_linuxenterprise_linuxn/a
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2017-11424
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.85% / 74.88%
||
7 Day CHG-0.44%
Published-24 Aug, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In PyJWT 1.5.0 and below the `invalid_strings` check in `HMACAlgorithm.prepare_key` does not account for all PEM encoded public keys. Specifically, the PKCS1 PEM encoded format would be allowed because it is prefaced with the string `-----BEGIN RSA PUBLIC KEY-----` which is not accounted for. This enables symmetric/asymmetric key confusion attacks against users using the PKCS1 PEM encoded public keys, which would allow an attacker to craft JWTs from scratch.

Action-Not Available
Vendor-pyjwt_projectn/aDebian GNU/Linux
Product-pyjwtdebian_linuxn/a
CVE-2019-16792
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-7.1||HIGH
EPSS-0.85% / 74.94%
||
7 Day CHG~0.00%
Published-22 Jan, 2020 | 18:30
Updated-05 Aug, 2024 | 01:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HTTP Request Smuggling: Content-Length Sent Twice in Waitress

Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. If two Content-Length headers are sent in a single request, Waitress would treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining. This issue is fixed in Waitress 1.4.0.

Action-Not Available
Vendor-agendalessPylonsOracle CorporationDebian GNU/Linux
Product-communications_cloud_native_core_network_function_cloud_native_environmentwaitressdebian_linuxWaitress
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2019-16786
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-7.1||HIGH
EPSS-0.90% / 75.69%
||
7 Day CHG~0.00%
Published-20 Dec, 2019 | 23:00
Updated-05 Aug, 2024 | 01:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HTTP Request Smuggling: Invalid Transfer-Encoding in Waitress

Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with chunked. Requests sent with: "Transfer-Encoding: gzip, chunked" would incorrectly get ignored, and the request would use a Content-Length header instead to determine the body size of the HTTP message. This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining. This issue is fixed in Waitress 1.4.0.

Action-Not Available
Vendor-agendalessPylonsOracle CorporationRed Hat, Inc.Fedora ProjectDebian GNU/Linux
Product-debian_linuxcommunications_cloud_native_core_network_function_cloud_native_environmentopenstackfedorawaitressWaitress
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2019-15998
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.36% / 58.17%
||
7 Day CHG~0.00%
Published-26 Nov, 2019 | 03:41
Updated-19 Nov, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XR Software NETCONF Over Secure Shell ACL Bypass Vulnerability

A vulnerability in the access-control logic of the NETCONF over Secure Shell (SSH) of Cisco IOS XR Software may allow connections despite an access control list (ACL) that is configured to deny access to the NETCONF over SSH of an affected device. The vulnerability is due to a missing check in the NETCONF over SSH access control list (ACL). An attacker could exploit this vulnerability by connecting to an affected device using NETCONF over SSH. A successful exploit could allow the attacker to connect to the device on the NETCONF port. Valid credentials are required to access the device. This vulnerability does not affect connections to the default SSH process on the device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-asr_9904asr_9006asr_9912asr_9922asr_9010asr_9001ios_xrasr_9901Cisco IOS XR Software
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-862
Missing Authorization
CVE-2019-15165
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-1.03% / 77.37%
||
7 Day CHG~0.00%
Published-03 Oct, 2019 | 18:38
Updated-03 Dec, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory.

Action-Not Available
Vendor-n/aApple Inc.Oracle CorporationFedora Projecttcpdump & libpcapDebian GNU/LinuxCanonical Ltd.openSUSE
Product-watchosubuntu_linuxcommunications_operations_monitorleapfedoraiphone_osmac_os_xlibpcapdebian_linuxtvosipadosn/a
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2019-15523
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.67% / 71.37%
||
7 Day CHG~0.00%
Published-30 Dec, 2020 | 20:04
Updated-05 Aug, 2024 | 00:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in LINBIT csync2 through 2.0. It does not correctly check for the return value GNUTLS_E_WARNING_ALERT_RECEIVED of the gnutls_handshake() function. It neglects to call this function again, as required by the design of the API.

Action-Not Available
Vendor-linbitn/aDebian GNU/Linux
Product-debian_linuxcsync2n/a
CWE ID-CWE-252
Unchecked Return Value
CVE-2019-14452
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.04% / 86.70%
||
7 Day CHG~0.00%
Published-31 Jul, 2019 | 01:33
Updated-05 Aug, 2024 | 00:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Sigil before 0.9.16 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in a ZIP archive entry that is mishandled during extraction.

Action-Not Available
Vendor-sigil-ebookflightcrew_projectn/aCanonical Ltd.
Product-ubuntu_linuxflightcrewsigiln/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2017-1000115
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.14% / 84.24%
||
7 Day CHG~0.00%
Published-04 Oct, 2017 | 01:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mercurial prior to version 4.3 is vulnerable to a missing symlink check that can malicious repositories to modify files outside the repository

Action-Not Available
Vendor-mercurialn/aRed Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_desktopenterprise_linux_server_tusmercurialenterprise_linux_workstationenterprise_linux_server_eusdebian_linuxenterprise_linux_serverenterprise_linux_server_ausn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2017-0368
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 46.60%
||
7 Day CHG~0.00%
Published-13 Apr, 2018 | 16:00
Updated-16 Sep, 2024 | 23:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Make rawHTML mode not apply to system messages

Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw making rawHTML mode apply to system messages.

Action-Not Available
Vendor-Debian GNU/LinuxWikimedia Foundation
Product-debian_linuxmediawikimediawiki
CWE ID-CWE-20
Improper Input Validation
CVE-2017-0370
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 46.60%
||
7 Day CHG~0.00%
Published-13 Apr, 2018 | 16:00
Updated-16 Sep, 2024 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Spam blacklist ineffective on encoded URLs inside file inclusion syntax's link parameter

Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw were Spam blacklist is ineffective on encoded URLs inside file inclusion syntax's link parameter.

Action-Not Available
Vendor-Debian GNU/LinuxWikimedia Foundation
Product-debian_linuxmediawikimediawiki
CWE ID-CWE-20
Improper Input Validation
CVE-2016-9646
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-5.3||MEDIUM
EPSS-0.26% / 49.62%
||
7 Day CHG~0.00%
Published-13 Apr, 2018 | 15:00
Updated-16 Sep, 2024 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Commit metadata forgery via CGI::FormBuilder context-dependent APIs

ikiwiki before 3.20161229 incorrectly called the CGI::FormBuilder->field method (similar to the CGI->param API that led to Bugzilla's CVE-2014-1572), which can be abused to lead to commit metadata forgery.

Action-Not Available
Vendor-ikiwikiikiwikiDebian GNU/Linux
Product-ikiwikidebian_linuxikiwiki
CWE ID-CWE-287
Improper Authentication
CVE-2019-1234
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-16.63% / 94.94%
||
7 Day CHG+0.72%
Published-12 Nov, 2019 | 18:52
Updated-04 Aug, 2024 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A spoofing vulnerability exists when Azure Stack fails to validate certain requests, aka 'Azure Stack Spoofing Vulnerability'.

Action-Not Available
Vendor-Microsoft Corporation
Product-azure_stackAzure Stack
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2019-12706
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.25% / 47.93%
||
7 Day CHG~0.00%
Published-02 Oct, 2019 | 19:06
Updated-19 Nov, 2024 | 18:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Email Security Appliance Filter Bypass Vulnerability

A vulnerability in the Sender Policy Framework (SPF) functionality of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the configured user filters on an affected device. The vulnerability exists because the affected software insufficiently validates certain incoming SPF messages. An attacker could exploit this vulnerability by sending a custom SPF packet to an affected device. A successful exploit could allow the attacker to bypass the configured header filters, which could allow malicious content to pass through the device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-email_security_appliance_firmwareCisco Email Security Appliance (ESA)
CWE ID-CWE-20
Improper Input Validation
CVE-2019-12664
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.68% / 71.66%
||
7 Day CHG~0.00%
Published-25 Sep, 2019 | 20:16
Updated-21 Nov, 2024 | 19:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software ISDN Data Leak Vulnerability

A vulnerability in the Dialer interface feature for ISDN connections in Cisco IOS XE Software for Cisco 4000 Series Integrated Services Routers (ISRs) could allow an unauthenticated, adjacent attacker to pass IPv4 traffic through an ISDN channel prior to successful PPP authentication. The vulnerability is due to insufficient validation of the state of the PPP IP Control Protocol (IPCP). An attacker could exploit this vulnerability by making an ISDN call to an affected device and sending traffic through the ISDN channel prior to successful PPP authentication. Alternatively, an unauthenticated, remote attacker could exploit this vulnerability by sending traffic through an affected device that is configured to exit via an ISDN connection for which both the Dialer interface and the Basic Rate Interface (BRI) have been configured, but the Challenge Handshake Authentication Protocol (CHAP) password for PPP does not match the remote end. A successful exploit could allow the attacker to pass IPv4 traffic through an unauthenticated ISDN connection for a few seconds, from initial ISDN call setup until PPP authentication fails.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xe4351_integrated_services_router4331_integrated_services_router4321_integrated_services_routerCisco IOS XE Software
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-287
Improper Authentication
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 11
  • 12
  • Next
Details not found