![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.90020 |
Categoría: | Windows : Microsoft Bulletins |
Título: | Microsoft Windows DNS Client Spoofing Vulnerability (MS08-020, 945553) |
Resumen: | The remote host is probably affected by the vulnerability described in; CVE-2008-0087 |
Descripción: | Summary: The remote host is probably affected by the vulnerability described in CVE-2008-0087 Vulnerability Impact: The DNS client in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, and Vista uses predictable DNS transaction IDs, which allows remote attackers to spoof DNS responses. Solution: All Users should upgrade to the latest version. CVSS Score: 8.8 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-0087 BugTraq ID: 28553 http://www.securityfocus.com/bid/28553 Bugtraq: 20080408 Microsoft Windows DNS Stub Resolver Cache Poisoning (MS08-020) (Google Search) http://www.securityfocus.com/archive/1/490575/100/0/threaded Cert/CC Advisory: TA08-099A http://www.us-cert.gov/cas/techalerts/TA08-099A.html HPdes Security Advisory: HPSBST02329 http://marc.info/?l=bugtraq&m=120845064910729&w=2 HPdes Security Advisory: SSRT080048 http://www.trusteer.com/docs/windowsresolver.html Microsoft Security Bulletin: MS08-020 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-020 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5314 http://www.securitytracker.com/id?1019802 http://secunia.com/advisories/29696 http://www.vupen.com/english/advisories/2008/1144/references |
Copyright | Copyright (C) 2008 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |