{"id":"CVE-2008-1447","details":"The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\"","modified":"2026-04-10T03:39:44.039961Z","published":"2008-07-08T23:41:00Z","related":["openSUSE-SU-2024:10612-1"],"references":[{"type":"ADVISORY","url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc"},{"type":"ADVISORY","url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"},{"type":"ADVISORY","url":"http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"},{"type":"ADVISORY","url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"},{"type":"ADVISORY","url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"},{"type":"ADVISORY","url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"},{"type":"ADVISORY","url":"http://marc.info/?l=bugtraq&m=121630706004256&w=2"},{"type":"ADVISORY","url":"http://marc.info/?l=bugtraq&m=121866517322103&w=2"},{"type":"ADVISORY","url":"http://marc.info/?l=bugtraq&m=123324863916385&w=2"},{"type":"ADVISORY","url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2008-0533.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30925"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30973"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30977"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30979"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30980"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30988"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30989"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30998"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31011"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31012"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31014"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31019"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31022"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31030"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31031"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31033"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31052"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31065"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31072"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31093"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31094"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31137"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31143"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31151"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31152"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31153"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31169"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31197"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31199"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31204"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31207"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31209"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31212"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31213"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31221"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31236"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31237"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31254"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31326"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31354"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31422"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31430"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31451"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31482"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31495"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31588"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31687"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31823"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31882"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31900"},{"type":"ADVISORY","url":"http://secunia.com/advisories/33178"},{"type":"ADVISORY","url":"http://secunia.com/advisories/33714"},{"type":"ADVISORY","url":"http://secunia.com/advisories/33786"},{"type":"ADVISORY","url":"http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-200807-08.xml"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-200812-17.xml"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"type":"ADVISORY","url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680"},{"type":"ADVISORY","url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239"},{"type":"ADVISORY","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"},{"type":"ADVISORY","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"},{"type":"ADVISORY","url":"http://support.apple.com/kb/HT3026"},{"type":"ADVISORY","url":"http://support.apple.com/kb/HT3129"},{"type":"ADVISORY","url":"http://support.citrix.com/article/CTX117991"},{"type":"ADVISORY","url":"http://support.citrix.com/article/CTX118183"},{"type":"ADVISORY","url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152"},{"type":"ADVISORY","url":"http://up2date.astaro.com/2008/08/up2date_7202_released.html"},{"type":"ADVISORY","url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231"},{"type":"ADVISORY","url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"},{"type":"ADVISORY","url":"http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"},{"type":"ADVISORY","url":"http://www.caughq.org/exploits/CAU-EX-2008-0002.txt"},{"type":"ADVISORY","url":"http://www.caughq.org/exploits/CAU-EX-2008-0003.txt"},{"type":"ADVISORY","url":"http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml"},{"type":"ADVISORY","url":"http://www.debian.org/security/2008/dsa-1604"},{"type":"ADVISORY","url":"http://www.debian.org/security/2008/dsa-1605"},{"type":"ADVISORY","url":"http://www.debian.org/security/2008/dsa-1619"},{"type":"ADVISORY","url":"http://www.debian.org/security/2008/dsa-1623"},{"type":"ADVISORY","url":"http://www.doxpara.com/?p=1176"},{"type":"ADVISORY","url":"http://www.doxpara.com/DMK_BO2K8.ppt"},{"type":"ADVISORY","url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26667"},{"type":"ADVISORY","url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26668"},{"type":"ADVISORY","url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26669"},{"type":"ADVISORY","url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26670"},{"type":"ADVISORY","url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26671"},{"type":"ADVISORY","url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26672"},{"type":"ADVISORY","url":"http://www.ipcop.org/index.php?name=News&file=article&sid=40"},{"type":"ADVISORY","url":"http://www.isc.org/index.pl?/sw/bind/bind-security.php"},{"type":"ADVISORY","url":"http://www.kb.cert.org/vuls/id/800113"},{"type":"ADVISORY","url":"http://www.kb.cert.org/vuls/id/MIMG-7DWR4J"},{"type":"ADVISORY","url":"http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:139"},{"type":"ADVISORY","url":"http://www.nominum.com/asset_upload_file741_2661.pdf"},{"type":"ADVISORY","url":"http://www.novell.com/support/viewContent.do?externalId=7000912"},{"type":"ADVISORY","url":"http://www.openbsd.org/errata42.html#013_bind"},{"type":"ADVISORY","url":"http://www.openbsd.org/errata43.html#004_bind"},{"type":"ADVISORY","url":"http://www.phys.uu.nl/~rombouts/pdnsd.html"},{"type":"ADVISORY","url":"http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog"},{"type":"ADVISORY","url":"http://www.redhat.com/support/errata/RHSA-2008-0789.html"},{"type":"ADVISORY","url":"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html"},{"type":"ADVISORY","url":"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/archive/1/495289/100/0/threaded"},{"type":"ADVISORY","url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/30131"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020437"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020438"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020440"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020448"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020449"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020548"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020558"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020560"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020561"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020575"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020576"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020577"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020578"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020579"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020651"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020653"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020702"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020802"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020804"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/usn-622-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/usn-627-1"},{"type":"ADVISORY","url":"http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"},{"type":"ADVISORY","url":"http://www.us-cert.gov/cas/techalerts/TA08-190A.html"},{"type":"ADVISORY","url":"http://www.us-cert.gov/cas/techalerts/TA08-190B.html"},{"type":"ADVISORY","url":"http://www.us-cert.gov/cas/techalerts/TA08-260A.html"},{"type":"ADVISORY","url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2019/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2023/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2025/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2029/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2030/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2050/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2051/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2052/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2055/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2092/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2113/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2114/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2123/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2139/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2166/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2195/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2196/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2197/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2268"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2291"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2334"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2342"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2377"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2383"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2384"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2466"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2467"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2482"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2525"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2549"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2558"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2582"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2584"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2009/0297"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2009/0311"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/0622"},{"type":"ADVISORY","url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"},{"type":"ADVISORY","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"},{"type":"ADVISORY","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"},{"type":"ADVISORY","url":"https://www.exploit-db.com/exploits/6122"},{"type":"ADVISORY","url":"https://www.exploit-db.com/exploits/6123"},{"type":"ADVISORY","url":"https://www.exploit-db.com/exploits/6130"},{"type":"ADVISORY","url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html"},{"type":"ADVISORY","url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html"},{"type":"ARTICLE","url":"http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"},{"type":"ARTICLE","url":"http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"},{"type":"ARTICLE","url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"},{"type":"ARTICLE","url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"},{"type":"ARTICLE","url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"},{"type":"FIX","url":"http://www.debian.org/security/2008/dsa-1603"},{"type":"FIX","url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"},{"type":"WEB","url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520"},{"type":"WEB","url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"},{"type":"WEB","url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/800113"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/MIMG-7DWR4J"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q"},{"type":"WEB","url":"http://www.us-cert.gov/cas/techalerts/TA08-190A.html"},{"type":"WEB","url":"http://www.us-cert.gov/cas/techalerts/TA08-190B.html"},{"type":"WEB","url":"http://www.us-cert.gov/cas/techalerts/TA08-260A.html"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"}]}