![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.90020 |
Category: | Windows : Microsoft Bulletins |
Title: | Microsoft Windows DNS Client Spoofing Vulnerability (MS08-020, 945553) |
Summary: | The remote host is probably affected by the vulnerability described in; CVE-2008-0087 |
Description: | Summary: The remote host is probably affected by the vulnerability described in CVE-2008-0087 Vulnerability Impact: The DNS client in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, and Vista uses predictable DNS transaction IDs, which allows remote attackers to spoof DNS responses. Solution: All Users should upgrade to the latest version. CVSS Score: 8.8 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-0087 BugTraq ID: 28553 http://www.securityfocus.com/bid/28553 Bugtraq: 20080408 Microsoft Windows DNS Stub Resolver Cache Poisoning (MS08-020) (Google Search) http://www.securityfocus.com/archive/1/490575/100/0/threaded Cert/CC Advisory: TA08-099A http://www.us-cert.gov/cas/techalerts/TA08-099A.html HPdes Security Advisory: HPSBST02329 http://marc.info/?l=bugtraq&m=120845064910729&w=2 HPdes Security Advisory: SSRT080048 http://www.trusteer.com/docs/windowsresolver.html Microsoft Security Bulletin: MS08-020 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-020 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5314 http://www.securitytracker.com/id?1019802 http://secunia.com/advisories/29696 http://www.vupen.com/english/advisories/2008/1144/references |
Copyright | Copyright (C) 2008 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |