Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2008-1447
PUBLISHED
More InfoOfficial Page
Assigner-microsoft
Assigner Org ID-f38d906d-7342-40ea-92c1-6c4a2c6478c8
View Known Exploited Vulnerability (KEV) details
Published At-08 Jul, 2008 | 23:00
Updated At-07 Aug, 2024 | 08:24
Rejected At-
â–¼CVE Numbering Authority (CNA)

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securitytracker.com/id?1020438
vdb-entry
x_refsource_SECTRACK
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
vendor-advisory
x_refsource_FEDORA
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
vendor-advisory
x_refsource_SUSE
http://www.kb.cert.org/vuls/id/800113
third-party-advisory
x_refsource_CERT-VN
http://secunia.com/advisories/31137
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31430
third-party-advisory
x_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
x_refsource_CONFIRM
http://secunia.com/advisories/31169
third-party-advisory
x_refsource_SECUNIA
http://www.phys.uu.nl/~rombouts/pdnsd.html
x_refsource_CONFIRM
http://www.securitytracker.com/id?1020702
vdb-entry
x_refsource_SECTRACK
http://security.gentoo.org/glsa/glsa-201209-25.xml
vendor-advisory
x_refsource_GENTOO
http://www.vupen.com/english/advisories/2008/2052/references
vdb-entry
x_refsource_VUPEN
http://www.securitytracker.com/id?1020561
vdb-entry
x_refsource_SECTRACK
http://www.vmware.com/security/advisories/VMSA-2008-0014.html
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141879471518471&w=2
vendor-advisory
x_refsource_HP
http://www.securitytracker.com/id?1020578
vdb-entry
x_refsource_SECTRACK
http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
vendor-advisory
x_refsource_FREEBSD
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
vdb-entry
signature
x_refsource_OVAL
http://www.securitytracker.com/id?1020802
vdb-entry
x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=123324863916385&w=2
vendor-advisory
x_refsource_HP
http://www.securityfocus.com/bid/30131
vdb-entry
x_refsource_BID
http://www.openbsd.org/errata42.html#013_bind
vendor-advisory
x_refsource_OPENBSD
http://secunia.com/advisories/31236
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
vendor-advisory
x_refsource_APPLE
http://www.securitytracker.com/id?1020651
vdb-entry
x_refsource_SECTRACK
http://www.securitytracker.com/id?1020437
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31209
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31012
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31151
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2050/references
vdb-entry
x_refsource_VUPEN
http://support.citrix.com/article/CTX117991
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141879471518471&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/31237
third-party-advisory
x_refsource_SECUNIA
http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
x_refsource_CONFIRM
http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
vendor-advisory
x_refsource_APPLE
https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
vdb-entry
x_refsource_XF
http://secunia.com/advisories/31495
third-party-advisory
x_refsource_SECUNIA
https://www.exploit-db.com/exploits/6130
exploit
x_refsource_EXPLOIT-DB
http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
vendor-advisory
x_refsource_CISCO
http://www.securitytracker.com/id?1020579
vdb-entry
x_refsource_SECTRACK
http://www.nominum.com/asset_upload_file741_2661.pdf
x_refsource_MISC
http://www.securitytracker.com/id?1020653
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/30998
third-party-advisory
x_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1603
vendor-advisory
x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2008/2525
vdb-entry
x_refsource_VUPEN
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/31094
third-party-advisory
x_refsource_SECUNIA
http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
vendor-advisory
x_refsource_AIXAPAR
http://secunia.com/advisories/31687
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2025/references
vdb-entry
x_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
vendor-advisory
x_refsource_SUNALERT
http://www.us-cert.gov/cas/techalerts/TA08-260A.html
third-party-advisory
x_refsource_CERT
http://secunia.com/advisories/31588
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31019
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2029/references
vdb-entry
x_refsource_VUPEN
http://marc.info/?l=bugtraq&m=121630706004256&w=2
vendor-advisory
x_refsource_HP
https://www.exploit-db.com/exploits/6123
exploit
x_refsource_EXPLOIT-DB
http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
vendor-advisory
x_refsource_AIXAPAR
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
vendor-advisory
x_refsource_FEDORA
http://www.vupen.com/english/advisories/2008/2268
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2009/0297
vdb-entry
x_refsource_VUPEN
http://marc.info/?l=bugtraq&m=121630706004256&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/31207
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31031
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2584
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31451
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2051/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/30977
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0789.html
vendor-advisory
x_refsource_REDHAT
http://www.vupen.com/english/advisories/2008/2377
vdb-entry
x_refsource_VUPEN
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
vendor-advisory
x_refsource_HP
http://www.securitytracker.com/id?1020558
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31221
third-party-advisory
x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2008-0533.html
vendor-advisory
x_refsource_REDHAT
http://www.openbsd.org/errata43.html#004_bind
vendor-advisory
x_refsource_OPENBSD
http://www.securitytracker.com/id?1020804
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31143
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/495289/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2008/2195/references
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/2196/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/33714
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=121866517322103&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/33786
third-party-advisory
x_refsource_SECUNIA
http://www.securitytracker.com/id?1020448
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31882
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2384
vdb-entry
x_refsource_VUPEN
http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
vendor-advisory
x_refsource_AIXAPAR
http://up2date.astaro.com/2008/08/up2date_7202_released.html
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/2123/references
vdb-entry
x_refsource_VUPEN
http://support.apple.com/kb/HT3026
x_refsource_CONFIRM
http://secunia.com/advisories/31014
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30979
third-party-advisory
x_refsource_SECUNIA
http://www.securitytracker.com/id?1020575
vdb-entry
x_refsource_SECTRACK
http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/2482
vdb-entry
x_refsource_VUPEN
http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
vendor-advisory
x_refsource_AIXAPAR
http://support.apple.com/kb/HT3129
x_refsource_CONFIRM
http://www.debian.org/security/2008/dsa-1619
vendor-advisory
x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2008/2166/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31072
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2139/references
vdb-entry
x_refsource_VUPEN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
vdb-entry
signature
x_refsource_OVAL
http://www.vupen.com/english/advisories/2008/2092/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31482
third-party-advisory
x_refsource_SECUNIA
http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
vendor-advisory
x_refsource_AIXAPAR
http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
vendor-advisory
x_refsource_MANDRIVA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/30989
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2055/references
vdb-entry
x_refsource_VUPEN
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
vendor-advisory
x_refsource_HP
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
x_refsource_CONFIRM
http://www.ipcop.org/index.php?name=News&file=article&sid=40
x_refsource_CONFIRM
http://secunia.com/advisories/31065
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31254
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/495869/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.doxpara.com/?p=1176
x_refsource_MISC
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
vendor-advisory
x_refsource_NETBSD
http://www.ubuntu.com/usn/usn-627-1
vendor-advisory
x_refsource_UBUNTU
http://www.vupen.com/english/advisories/2010/0622
vdb-entry
x_refsource_VUPEN
http://www.securitytracker.com/id?1020576
vdb-entry
x_refsource_SECTRACK
http://www.isc.org/index.pl?/sw/bind/bind-security.php
x_refsource_CONFIRM
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/31153
third-party-advisory
x_refsource_SECUNIA
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/2549
vdb-entry
x_refsource_VUPEN
http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
vendor-advisory
x_refsource_AIXAPAR
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
x_refsource_CONFIRM
http://secunia.com/advisories/31213
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31030
third-party-advisory
x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-622-1
vendor-advisory
x_refsource_UBUNTU
http://secunia.com/advisories/31033
third-party-advisory
x_refsource_SECUNIA
http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
x_refsource_MISC
http://www.securitytracker.com/id?1020440
vdb-entry
x_refsource_SECTRACK
http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
vendor-advisory
x_refsource_APPLE
http://www.doxpara.com/DMK_BO2K8.ppt
x_refsource_MISC
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
mailing-list
x_refsource_FULLDISC
http://www.debian.org/security/2008/dsa-1604
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/31823
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31326
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2558
vdb-entry
x_refsource_VUPEN
https://www.exploit-db.com/exploits/6122
exploit
x_refsource_EXPLOIT-DB
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
vdb-entry
signature
x_refsource_OVAL
http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
vdb-entry
x_refsource_XF
http://www.vupen.com/english/advisories/2008/2383
vdb-entry
x_refsource_VUPEN
http://www.securitytracker.com/id?1020560
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31900
third-party-advisory
x_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
x_refsource_CONFIRM
http://support.citrix.com/article/CTX118183
x_refsource_CONFIRM
http://secunia.com/advisories/30925
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/0311
vdb-entry
x_refsource_VUPEN
http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
x_refsource_CONFIRM
http://www.debian.org/security/2008/dsa-1623
vendor-advisory
x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2008/2582
vdb-entry
x_refsource_VUPEN
http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
x_refsource_MISC
http://www.debian.org/security/2008/dsa-1605
vendor-advisory
x_refsource_DEBIAN
http://www.novell.com/support/viewContent.do?externalId=7000912
x_refsource_CONFIRM
http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/2342
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/2114/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/30973
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31204
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31354
third-party-advisory
x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200812-17.xml
vendor-advisory
x_refsource_GENTOO
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/33178
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30988
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
vendor-advisory
x_refsource_APPLE
http://secunia.com/advisories/31011
third-party-advisory
x_refsource_SECUNIA
http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
x_refsource_MISC
http://www.vupen.com/english/advisories/2008/2334
vdb-entry
x_refsource_VUPEN
http://www.securitytracker.com/id?1020577
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31422
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31197
third-party-advisory
x_refsource_SECUNIA
http://www.securitytracker.com/id?1020548
vdb-entry
x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2008/2467
vdb-entry
x_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
vendor-advisory
x_refsource_SUNALERT
http://www.us-cert.gov/cas/techalerts/TA08-190B.html
third-party-advisory
x_refsource_CERT
http://www.us-cert.gov/cas/techalerts/TA08-190A.html
third-party-advisory
x_refsource_CERT
http://security.gentoo.org/glsa/glsa-200807-08.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/31022
third-party-advisory
x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
vendor-advisory
x_refsource_SLACKWARE
http://www.securitytracker.com/id?1020449
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/31093
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31052
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30980
third-party-advisory
x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
vendor-advisory
x_refsource_SLACKWARE
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
x_refsource_CONFIRM
http://secunia.com/advisories/31199
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2030/references
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/2291
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/2023/references
vdb-entry
x_refsource_VUPEN
http://marc.info/?l=bugtraq&m=123324863916385&w=2
vendor-advisory
x_refsource_HP
http://www.vupen.com/english/advisories/2008/2466
vdb-entry
x_refsource_VUPEN
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
vendor-advisory
x_refsource_MS
http://secunia.com/advisories/31212
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2113/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31152
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2019/references
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/2197/references
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securitytracker.com/id?1020438
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.kb.cert.org/vuls/id/800113
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: http://secunia.com/advisories/31137
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31430
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31169
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.phys.uu.nl/~rombouts/pdnsd.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securitytracker.com/id?1020702
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://security.gentoo.org/glsa/glsa-201209-25.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.vupen.com/english/advisories/2008/2052/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securitytracker.com/id?1020561
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0014.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141879471518471&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.securitytracker.com/id?1020578
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.securitytracker.com/id?1020802
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://marc.info/?l=bugtraq&m=123324863916385&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.securityfocus.com/bid/30131
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.openbsd.org/errata42.html#013_bind
Resource:
vendor-advisory
x_refsource_OPENBSD
Hyperlink: http://secunia.com/advisories/31236
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://www.securitytracker.com/id?1020651
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.securitytracker.com/id?1020437
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31209
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31012
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31151
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2050/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://support.citrix.com/article/CTX117991
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141879471518471&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/31237
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://secunia.com/advisories/31495
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://www.exploit-db.com/exploits/6130
Resource:
exploit
x_refsource_EXPLOIT-DB
Hyperlink: http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: http://www.securitytracker.com/id?1020579
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.nominum.com/asset_upload_file741_2661.pdf
Resource:
x_refsource_MISC
Hyperlink: http://www.securitytracker.com/id?1020653
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/30998
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2008/dsa-1603
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.vupen.com/english/advisories/2008/2525
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/31094
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://secunia.com/advisories/31687
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2025/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-260A.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://secunia.com/advisories/31588
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31019
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2029/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://marc.info/?l=bugtraq&m=121630706004256&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: https://www.exploit-db.com/exploits/6123
Resource:
exploit
x_refsource_EXPLOIT-DB
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://www.vupen.com/english/advisories/2008/2268
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2009/0297
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://marc.info/?l=bugtraq&m=121630706004256&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/31207
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31031
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2584
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31451
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2051/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/30977
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0789.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.vupen.com/english/advisories/2008/2377
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.securitytracker.com/id?1020558
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31221
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://rhn.redhat.com/errata/RHSA-2008-0533.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.openbsd.org/errata43.html#004_bind
Resource:
vendor-advisory
x_refsource_OPENBSD
Hyperlink: http://www.securitytracker.com/id?1020804
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31143
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/495289/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.vupen.com/english/advisories/2008/2195/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2008/2196/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/33714
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=121866517322103&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/33786
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securitytracker.com/id?1020448
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31882
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2384
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://up2date.astaro.com/2008/08/up2date_7202_released.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2008/2123/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://support.apple.com/kb/HT3026
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31014
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30979
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securitytracker.com/id?1020575
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2008/2482
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://support.apple.com/kb/HT3129
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.debian.org/security/2008/dsa-1619
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.vupen.com/english/advisories/2008/2166/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31072
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2139/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.vupen.com/english/advisories/2008/2092/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31482
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/30989
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2055/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.ipcop.org/index.php?name=News&file=article&sid=40
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31065
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31254
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/495869/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.doxpara.com/?p=1176
Resource:
x_refsource_MISC
Hyperlink: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
Resource:
vendor-advisory
x_refsource_NETBSD
Hyperlink: http://www.ubuntu.com/usn/usn-627-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.vupen.com/english/advisories/2010/0622
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securitytracker.com/id?1020576
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.isc.org/index.pl?/sw/bind/bind-security.php
Resource:
x_refsource_CONFIRM
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/31153
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2008/2549
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31213
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31030
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ubuntu.com/usn/usn-622-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://secunia.com/advisories/31033
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
Resource:
x_refsource_MISC
Hyperlink: http://www.securitytracker.com/id?1020440
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://www.doxpara.com/DMK_BO2K8.ppt
Resource:
x_refsource_MISC
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://www.debian.org/security/2008/dsa-1604
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/31823
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31326
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2558
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://www.exploit-db.com/exploits/6122
Resource:
exploit
x_refsource_EXPLOIT-DB
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
Resource:
x_refsource_MISC
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.vupen.com/english/advisories/2008/2383
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securitytracker.com/id?1020560
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31900
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.citrix.com/article/CTX118183
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/30925
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2009/0311
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.debian.org/security/2008/dsa-1623
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.vupen.com/english/advisories/2008/2582
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
Resource:
x_refsource_MISC
Hyperlink: http://www.debian.org/security/2008/dsa-1605
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.novell.com/support/viewContent.do?externalId=7000912
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2008/2342
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2008/2114/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/30973
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31204
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31354
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://security.gentoo.org/glsa/glsa-200812-17.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/33178
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30988
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://secunia.com/advisories/31011
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
Resource:
x_refsource_MISC
Hyperlink: http://www.vupen.com/english/advisories/2008/2334
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securitytracker.com/id?1020577
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31422
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31197
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securitytracker.com/id?1020548
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.vupen.com/english/advisories/2008/2467
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-190B.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-190A.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://security.gentoo.org/glsa/glsa-200807-08.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/31022
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://www.securitytracker.com/id?1020449
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/31093
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31052
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30980
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31199
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2030/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2008/2291
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2008/2023/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://marc.info/?l=bugtraq&m=123324863916385&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.vupen.com/english/advisories/2008/2466
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
Resource:
vendor-advisory
x_refsource_MS
Hyperlink: http://secunia.com/advisories/31212
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2113/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31152
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2019/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2008/2197/references
Resource:
vdb-entry
x_refsource_VUPEN
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securitytracker.com/id?1020438
vdb-entry
x_refsource_SECTRACK
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.kb.cert.org/vuls/id/800113
third-party-advisory
x_refsource_CERT-VN
x_transferred
http://secunia.com/advisories/31137
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31430
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31169
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.phys.uu.nl/~rombouts/pdnsd.html
x_refsource_CONFIRM
x_transferred
http://www.securitytracker.com/id?1020702
vdb-entry
x_refsource_SECTRACK
x_transferred
http://security.gentoo.org/glsa/glsa-201209-25.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.vupen.com/english/advisories/2008/2052/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securitytracker.com/id?1020561
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.vmware.com/security/advisories/VMSA-2008-0014.html
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141879471518471&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.securitytracker.com/id?1020578
vdb-entry
x_refsource_SECTRACK
x_transferred
http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.securitytracker.com/id?1020802
vdb-entry
x_refsource_SECTRACK
x_transferred
http://marc.info/?l=bugtraq&m=123324863916385&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.securityfocus.com/bid/30131
vdb-entry
x_refsource_BID
x_transferred
http://www.openbsd.org/errata42.html#013_bind
vendor-advisory
x_refsource_OPENBSD
x_transferred
http://secunia.com/advisories/31236
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://www.securitytracker.com/id?1020651
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.securitytracker.com/id?1020437
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31209
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31012
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31151
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2050/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://support.citrix.com/article/CTX117991
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141879471518471&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/31237
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
x_refsource_CONFIRM
x_transferred
http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
vendor-advisory
x_refsource_APPLE
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
vdb-entry
x_refsource_XF
x_transferred
http://secunia.com/advisories/31495
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://www.exploit-db.com/exploits/6130
exploit
x_refsource_EXPLOIT-DB
x_transferred
http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
vendor-advisory
x_refsource_CISCO
x_transferred
http://www.securitytracker.com/id?1020579
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.nominum.com/asset_upload_file741_2661.pdf
x_refsource_MISC
x_transferred
http://www.securitytracker.com/id?1020653
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/30998
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.debian.org/security/2008/dsa-1603
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.vupen.com/english/advisories/2008/2525
vdb-entry
x_refsource_VUPEN
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/31094
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://secunia.com/advisories/31687
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2025/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.us-cert.gov/cas/techalerts/TA08-260A.html
third-party-advisory
x_refsource_CERT
x_transferred
http://secunia.com/advisories/31588
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31019
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2029/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://marc.info/?l=bugtraq&m=121630706004256&w=2
vendor-advisory
x_refsource_HP
x_transferred
https://www.exploit-db.com/exploits/6123
exploit
x_refsource_EXPLOIT-DB
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
vendor-advisory
x_refsource_AIXAPAR
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://www.vupen.com/english/advisories/2008/2268
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2009/0297
vdb-entry
x_refsource_VUPEN
x_transferred
http://marc.info/?l=bugtraq&m=121630706004256&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/31207
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31031
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2584
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31451
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2051/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/30977
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0789.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.vupen.com/english/advisories/2008/2377
vdb-entry
x_refsource_VUPEN
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
vendor-advisory
x_refsource_HP
x_transferred
http://www.securitytracker.com/id?1020558
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31221
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://rhn.redhat.com/errata/RHSA-2008-0533.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.openbsd.org/errata43.html#004_bind
vendor-advisory
x_refsource_OPENBSD
x_transferred
http://www.securitytracker.com/id?1020804
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31143
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/495289/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.vupen.com/english/advisories/2008/2195/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2008/2196/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/33714
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=121866517322103&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/33786
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securitytracker.com/id?1020448
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31882
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2384
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://up2date.astaro.com/2008/08/up2date_7202_released.html
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2008/2123/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://support.apple.com/kb/HT3026
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31014
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30979
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securitytracker.com/id?1020575
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2008/2482
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://support.apple.com/kb/HT3129
x_refsource_CONFIRM
x_transferred
http://www.debian.org/security/2008/dsa-1619
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.vupen.com/english/advisories/2008/2166/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31072
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2139/references
vdb-entry
x_refsource_VUPEN
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.vupen.com/english/advisories/2008/2092/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31482
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
vendor-advisory
x_refsource_MANDRIVA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/30989
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2055/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
vendor-advisory
x_refsource_HP
x_transferred
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
x_refsource_CONFIRM
x_transferred
http://www.ipcop.org/index.php?name=News&file=article&sid=40
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31065
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31254
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/495869/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.doxpara.com/?p=1176
x_refsource_MISC
x_transferred
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
vendor-advisory
x_refsource_NETBSD
x_transferred
http://www.ubuntu.com/usn/usn-627-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.vupen.com/english/advisories/2010/0622
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securitytracker.com/id?1020576
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.isc.org/index.pl?/sw/bind/bind-security.php
x_refsource_CONFIRM
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/31153
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2008/2549
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31213
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31030
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ubuntu.com/usn/usn-622-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://secunia.com/advisories/31033
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
x_refsource_MISC
x_transferred
http://www.securitytracker.com/id?1020440
vdb-entry
x_refsource_SECTRACK
x_transferred
http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://www.doxpara.com/DMK_BO2K8.ppt
x_refsource_MISC
x_transferred
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
mailing-list
x_refsource_FULLDISC
x_transferred
http://www.debian.org/security/2008/dsa-1604
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/31823
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31326
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2558
vdb-entry
x_refsource_VUPEN
x_transferred
https://www.exploit-db.com/exploits/6122
exploit
x_refsource_EXPLOIT-DB
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
x_refsource_MISC
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
vdb-entry
x_refsource_XF
x_transferred
http://www.vupen.com/english/advisories/2008/2383
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securitytracker.com/id?1020560
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31900
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
x_refsource_CONFIRM
x_transferred
http://support.citrix.com/article/CTX118183
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/30925
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2009/0311
vdb-entry
x_refsource_VUPEN
x_transferred
http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
x_refsource_CONFIRM
x_transferred
http://www.debian.org/security/2008/dsa-1623
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.vupen.com/english/advisories/2008/2582
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
x_refsource_MISC
x_transferred
http://www.debian.org/security/2008/dsa-1605
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.novell.com/support/viewContent.do?externalId=7000912
x_refsource_CONFIRM
x_transferred
http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2008/2342
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2008/2114/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/30973
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31204
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31354
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://security.gentoo.org/glsa/glsa-200812-17.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/33178
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30988
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://secunia.com/advisories/31011
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
x_refsource_MISC
x_transferred
http://www.vupen.com/english/advisories/2008/2334
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securitytracker.com/id?1020577
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31422
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31197
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securitytracker.com/id?1020548
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.vupen.com/english/advisories/2008/2467
vdb-entry
x_refsource_VUPEN
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.us-cert.gov/cas/techalerts/TA08-190B.html
third-party-advisory
x_refsource_CERT
x_transferred
http://www.us-cert.gov/cas/techalerts/TA08-190A.html
third-party-advisory
x_refsource_CERT
x_transferred
http://security.gentoo.org/glsa/glsa-200807-08.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/31022
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://www.securitytracker.com/id?1020449
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/31093
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31052
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30980
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31199
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2030/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2008/2291
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2008/2023/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://marc.info/?l=bugtraq&m=123324863916385&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.vupen.com/english/advisories/2008/2466
vdb-entry
x_refsource_VUPEN
x_transferred
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
vendor-advisory
x_refsource_MS
x_transferred
http://secunia.com/advisories/31212
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2113/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31152
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2019/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2008/2197/references
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020438
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/800113
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: http://secunia.com/advisories/31137
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31430
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31169
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.phys.uu.nl/~rombouts/pdnsd.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020702
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-201209-25.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2052/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020561
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0014.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141879471518471&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020578
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020802
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=123324863916385&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.securityfocus.com/bid/30131
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.openbsd.org/errata42.html#013_bind
Resource:
vendor-advisory
x_refsource_OPENBSD
x_transferred
Hyperlink: http://secunia.com/advisories/31236
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020651
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020437
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31209
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31012
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31151
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2050/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://support.citrix.com/article/CTX117991
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141879471518471&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/31237
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://secunia.com/advisories/31495
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://www.exploit-db.com/exploits/6130
Resource:
exploit
x_refsource_EXPLOIT-DB
x_transferred
Hyperlink: http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020579
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.nominum.com/asset_upload_file741_2661.pdf
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020653
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/30998
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1603
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2525
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/31094
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://secunia.com/advisories/31687
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2025/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-260A.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://secunia.com/advisories/31588
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31019
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2029/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=121630706004256&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: https://www.exploit-db.com/exploits/6123
Resource:
exploit
x_refsource_EXPLOIT-DB
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2268
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/0297
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=121630706004256&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/31207
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31031
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2584
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31451
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2051/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/30977
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0789.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2377
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020558
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31221
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2008-0533.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.openbsd.org/errata43.html#004_bind
Resource:
vendor-advisory
x_refsource_OPENBSD
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020804
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31143
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/495289/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2195/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2196/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/33714
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=121866517322103&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/33786
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020448
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31882
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2384
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://up2date.astaro.com/2008/08/up2date_7202_released.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2123/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://support.apple.com/kb/HT3026
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31014
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30979
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020575
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2482
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://support.apple.com/kb/HT3129
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1619
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2166/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31072
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2139/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2092/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31482
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/30989
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2055/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.ipcop.org/index.php?name=News&file=article&sid=40
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31065
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31254
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/495869/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.doxpara.com/?p=1176
Resource:
x_refsource_MISC
x_transferred
Hyperlink: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
Resource:
vendor-advisory
x_refsource_NETBSD
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-627-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2010/0622
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020576
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.isc.org/index.pl?/sw/bind/bind-security.php
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/31153
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2549
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31213
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31030
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-622-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://secunia.com/advisories/31033
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020440
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://www.doxpara.com/DMK_BO2K8.ppt
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1604
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/31823
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31326
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2558
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://www.exploit-db.com/exploits/6122
Resource:
exploit
x_refsource_EXPLOIT-DB
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2383
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020560
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31900
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.citrix.com/article/CTX118183
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/30925
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/0311
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1623
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2582
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1605
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.novell.com/support/viewContent.do?externalId=7000912
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2342
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2114/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/30973
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31204
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31354
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200812-17.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/33178
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30988
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://secunia.com/advisories/31011
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2334
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020577
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31422
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31197
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020548
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2467
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-190B.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA08-190A.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200807-08.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/31022
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020449
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/31093
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31052
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30980
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31199
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2030/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2291
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2023/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=123324863916385&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2466
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
Resource:
vendor-advisory
x_refsource_MS
x_transferred
Hyperlink: http://secunia.com/advisories/31212
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2113/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31152
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2019/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2197/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Details not found