CVE-2008-1447 : Detail

CVE-2008-1447

6.8
/
Medium
A02-Cryptographic Failures
85.89%V4
Network
2008-07-08
21h00 +00:00
2018-10-12
17h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-331 Insufficient Entropy
The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.

Metrics

Metrics Score Severity CVSS Vector Source
V3.1 6.8 MEDIUM CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N

Base: Exploitabilty Metrics

The Exploitability metrics reflect the characteristics of the thing that is vulnerable, which we refer to formally as the vulnerable component.

Attack Vector

This metric reflects the context by which vulnerability exploitation is possible.

Network

The vulnerable component is bound to the network stack and the set of possible attackers extends beyond the other options listed below, up to and including the entire Internet. Such a vulnerability is often termed “remotely exploitable” and can be thought of as an attack being exploitable at the protocol level one or more network hops away (e.g., across one or more routers).

Attack Complexity

This metric describes the conditions beyond the attacker’s control that must exist in order to exploit the vulnerability.

High

successful attack depends on conditions beyond the attacker's control. That is, a successful attack cannot be accomplished at will, but requires the attacker to invest in some measurable amount of effort in preparation or execution against the vulnerable component before a successful attack can be expected.

Privileges Required

This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.

None

The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files of the vulnerable system to carry out an attack.

User Interaction

This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component.

None

The vulnerable system can be exploited without interaction from any user.

Base: Scope Metrics

The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope.

Scope

Formally, a security authority is a mechanism (e.g., an application, an operating system, firmware, a sandbox environment) that defines and enforces access control in terms of how certain subjects/actors (e.g., human users, processes) can access certain restricted objects/resources (e.g., files, CPU, memory) in a controlled manner. All the subjects and objects under the jurisdiction of a single security authority are considered to be under one security scope. If a vulnerability in a vulnerable component can affect a component which is in a different security scope than the vulnerable component, a Scope change occurs. Intuitively, whenever the impact of a vulnerability breaches a security/trust boundary and impacts components outside the security scope in which vulnerable component resides, a Scope change occurs.

Changed

An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component and the impacted component are different and managed by different security authorities.

Base: Impact Metrics

The Impact metrics capture the effects of a successfully exploited vulnerability on the component that suffers the worst outcome that is most directly and predictably associated with the attack. Analysts should constrain impacts to a reasonable, final outcome which they are confident an attacker is able to achieve.

Confidentiality Impact

This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability.

None

There is no loss of confidentiality within the impacted component.

Integrity Impact

This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information.

High

There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the impacted component. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the impacted component.

Availability Impact

This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability.

None

There is no impact to availability within the impacted component.

Temporal Metrics

The Temporal metrics measure the current state of exploit techniques or code availability, the existence of any patches or workarounds, or the confidence in the description of a vulnerability.

Environmental Metrics

These metrics enable the analyst to customize the CVSS score depending on the importance of the affected IT asset to a user’s organization, measured in terms of Confidentiality, Integrity, and Availability.

nvd@nist.gov
V2 5 AV:N/AC:L/Au:N/C:N/I:P/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 6122

Publication date : 2008-07-22 22h00 +00:00
Author : I)ruid
EDB Verified : Yes

Exploit Database EDB-ID : 6130

Publication date : 2008-07-24 22h00 +00:00
Author : Marc Bevand
EDB Verified : Yes

Exploit Database EDB-ID : 6123

Publication date : 2008-07-23 22h00 +00:00
Author : Julien Desfossez
EDB Verified : Yes

Products Mentioned

Configuraton 0

Canonical>>Ubuntu_linux >> Version 6.06

Canonical>>Ubuntu_linux >> Version 7.04

Canonical>>Ubuntu_linux >> Version 7.10

Canonical>>Ubuntu_linux >> Version 8.04

Cisco>>Ios >> Version 12.0

Debian>>Debian_linux >> Version 4.0

Microsoft>>Windows_2000 >> Version *

Microsoft>>Windows_server_2003 >> Version -

Microsoft>>Windows_server_2003 >> Version -

Microsoft>>Windows_server_2003 >> Version -

Microsoft>>Windows_server_2003 >> Version -

Microsoft>>Windows_server_2003 >> Version -

Microsoft>>Windows_server_2003 >> Version -

Microsoft>>Windows_server_2003 >> Version -

Microsoft>>Windows_server_2003 >> Version -

Microsoft>>Windows_server_2003 >> Version -

Microsoft>>Windows_server_2003 >> Version -

Microsoft>>Windows_server_2003 >> Version -

Microsoft>>Windows_server_2003 >> Version -

Microsoft>>Windows_server_2003 >> Version -

Microsoft>>Windows_server_2003 >> Version -

Microsoft>>Windows_server_2003 >> Version -

Microsoft>>Windows_server_2003 >> Version -

Microsoft>>Windows_xp >> Version *

Microsoft>>Windows_xp >> Version -

Microsoft>>Windows_xp >> Version -

Redhat>>Enterprise_linux >> Version 2.1

Redhat>>Enterprise_linux >> Version 2.1

Redhat>>Enterprise_linux >> Version 2.1

Redhat>>Enterprise_linux >> Version 5

Redhat>>Enterprise_linux >> Version 5

Redhat>>Enterprise_linux >> Version 5.0

Isc>>Bind >> Version 4

Isc>>Bind >> Version 8

Isc>>Bind >> Version 9.2.9

References

http://www.securitytracker.com/id?1020438
Tags : vdb-entry, x_refsource_SECTRACK
http://www.kb.cert.org/vuls/id/800113
Tags : third-party-advisory, x_refsource_CERT-VN
http://secunia.com/advisories/31137
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31430
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31169
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1020702
Tags : vdb-entry, x_refsource_SECTRACK
http://security.gentoo.org/glsa/glsa-201209-25.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://www.securitytracker.com/id?1020561
Tags : vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=141879471518471&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.securitytracker.com/id?1020578
Tags : vdb-entry, x_refsource_SECTRACK
http://www.securitytracker.com/id?1020802
Tags : vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=123324863916385&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.securityfocus.com/bid/30131
Tags : vdb-entry, x_refsource_BID
http://www.openbsd.org/errata42.html#013_bind
Tags : vendor-advisory, x_refsource_OPENBSD
http://secunia.com/advisories/31236
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1020651
Tags : vdb-entry, x_refsource_SECTRACK
http://www.securitytracker.com/id?1020437
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/31209
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31012
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31151
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141879471518471&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/31237
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31495
Tags : third-party-advisory, x_refsource_SECUNIA
https://www.exploit-db.com/exploits/6130
Tags : exploit, x_refsource_EXPLOIT-DB
http://www.securitytracker.com/id?1020579
Tags : vdb-entry, x_refsource_SECTRACK
http://www.securitytracker.com/id?1020653
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/30998
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1603
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2008/2525
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/31094
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
Tags : vendor-advisory, x_refsource_AIXAPAR
http://secunia.com/advisories/31687
Tags : third-party-advisory, x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
Tags : vendor-advisory, x_refsource_SUNALERT
http://www.us-cert.gov/cas/techalerts/TA08-260A.html
Tags : third-party-advisory, x_refsource_CERT
http://secunia.com/advisories/31588
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31019
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=121630706004256&w=2
Tags : vendor-advisory, x_refsource_HP
https://www.exploit-db.com/exploits/6123
Tags : exploit, x_refsource_EXPLOIT-DB
http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
Tags : vendor-advisory, x_refsource_AIXAPAR
http://www.vupen.com/english/advisories/2008/2268
Tags : vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2009/0297
Tags : vdb-entry, x_refsource_VUPEN
http://marc.info/?l=bugtraq&m=121630706004256&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/31207
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31031
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2584
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/31451
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30977
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0789.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2008/2377
Tags : vdb-entry, x_refsource_VUPEN
http://www.securitytracker.com/id?1020558
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/31221
Tags : third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2008-0533.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.openbsd.org/errata43.html#004_bind
Tags : vendor-advisory, x_refsource_OPENBSD
http://www.securitytracker.com/id?1020804
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/31143
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/33714
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=121866517322103&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/33786
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1020448
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/31882
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2384
Tags : vdb-entry, x_refsource_VUPEN
http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
Tags : vendor-advisory, x_refsource_AIXAPAR
http://support.apple.com/kb/HT3026
Tags : x_refsource_CONFIRM
http://secunia.com/advisories/31014
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30979
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1020575
Tags : vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2008/2482
Tags : vdb-entry, x_refsource_VUPEN
http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
Tags : vendor-advisory, x_refsource_AIXAPAR
http://support.apple.com/kb/HT3129
Tags : x_refsource_CONFIRM
http://www.debian.org/security/2008/dsa-1619
Tags : vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/31072
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31482
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
Tags : vendor-advisory, x_refsource_AIXAPAR
http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
Tags : vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/30989
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31065
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31254
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.doxpara.com/?p=1176
Tags : x_refsource_MISC
http://www.ubuntu.com/usn/usn-627-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.vupen.com/english/advisories/2010/0622
Tags : vdb-entry, x_refsource_VUPEN
http://www.securitytracker.com/id?1020576
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/31153
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2549
Tags : vdb-entry, x_refsource_VUPEN
http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
Tags : vendor-advisory, x_refsource_AIXAPAR
http://secunia.com/advisories/31213
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31030
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-622-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/31033
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1020440
Tags : vdb-entry, x_refsource_SECTRACK
http://www.debian.org/security/2008/dsa-1604
Tags : vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/31823
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31326
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2558
Tags : vdb-entry, x_refsource_VUPEN
https://www.exploit-db.com/exploits/6122
Tags : exploit, x_refsource_EXPLOIT-DB
http://www.vupen.com/english/advisories/2008/2383
Tags : vdb-entry, x_refsource_VUPEN
http://www.securitytracker.com/id?1020560
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/31900
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30925
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/0311
Tags : vdb-entry, x_refsource_VUPEN
http://www.debian.org/security/2008/dsa-1623
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2008/2582
Tags : vdb-entry, x_refsource_VUPEN
http://www.debian.org/security/2008/dsa-1605
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2008/2342
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/30973
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31204
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31354
Tags : third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200812-17.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/33178
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30988
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31011
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2334
Tags : vdb-entry, x_refsource_VUPEN
http://www.securitytracker.com/id?1020577
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/31422
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31197
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1020548
Tags : vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2008/2467
Tags : vdb-entry, x_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
Tags : vendor-advisory, x_refsource_SUNALERT
http://www.us-cert.gov/cas/techalerts/TA08-190B.html
Tags : third-party-advisory, x_refsource_CERT
http://www.us-cert.gov/cas/techalerts/TA08-190A.html
Tags : third-party-advisory, x_refsource_CERT
http://security.gentoo.org/glsa/glsa-200807-08.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/31022
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1020449
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/31093
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31052
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30980
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31199
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2291
Tags : vdb-entry, x_refsource_VUPEN
http://marc.info/?l=bugtraq&m=123324863916385&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.vupen.com/english/advisories/2008/2466
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/31212
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31152
Tags : third-party-advisory, x_refsource_SECUNIA