{
  "threat_severity" : "Important",
  "public_date" : "2008-07-08T18:00:00Z",
  "bugzilla" : {
    "description" : "bind: implement source UDP port randomization (CERT VU#800113)",
    "id" : "449345",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=449345"
  },
  "details" : [ "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\"" ],
  "acknowledgement" : "Red Hat would like to thank Dan Kaminsky for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 2.1",
    "release_date" : "2008-07-08T00:00:00Z",
    "advisory" : "RHSA-2008:0533",
    "cpe" : "cpe:/o:redhat:enterprise_linux:2.1",
    "package" : "bind-0:9.2.1-10.el2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 3",
    "release_date" : "2008-07-08T00:00:00Z",
    "advisory" : "RHSA-2008:0533",
    "cpe" : "cpe:/o:redhat:enterprise_linux:3",
    "package" : "bind-20:9.2.4-22.el3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 4",
    "release_date" : "2008-07-08T00:00:00Z",
    "advisory" : "RHSA-2008:0533",
    "cpe" : "cpe:/o:redhat:enterprise_linux:4",
    "package" : "bind-20:9.2.4-28.0.1.el4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 4",
    "release_date" : "2008-07-08T00:00:00Z",
    "advisory" : "RHSA-2008:0533",
    "cpe" : "cpe:/o:redhat:enterprise_linux:4",
    "package" : "selinux-policy-targeted-0:1.17.30-2.150.el4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2008-07-08T00:00:00Z",
    "advisory" : "RHSA-2008:0533",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "bind-30:9.3.4-6.0.2.P1.el5_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2008-07-08T00:00:00Z",
    "advisory" : "RHSA-2008:0533",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "selinux-policy-0:2.4.6-137.1.el5_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2008-08-11T00:00:00Z",
    "advisory" : "RHSA-2008:0789",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "dnsmasq-0:2.45-1.el5_2.1"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2008-1447\nhttps://nvd.nist.gov/vuln/detail/CVE-2008-1447" ],
  "name" : "CVE-2008-1447",
  "csaw" : false
}