U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2008-1447

Change History

Initial CVE Analysis 11/08/2016 10:01:54 AM

Action Type Old Value New Value
Changed CPE Configuration
Configuration 1
     AND
          OR
               cpe:2.3:o:canonical:ubuntu:6.06:*:lts:*:*:*:*:*
               cpe:2.3:o:canonical:ubuntu:7.04:*:*:*:*:*:*:*
               cpe:2.3:o:canonical:ubuntu:7.10:*:*:*:*:*:*:*
               cpe:2.3:o:canonical:ubuntu:8.04:*:lts:*:*:*:*:*
               cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*
               cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
               cpe:2.3:o:microsoft:windows:2003_server:*:x64:*:*:*:*:*
               cpe:2.3:o:microsoft:windows:2003_server:sp1:*:*:*:*:*:*
               cpe:2.3:o:microsoft:windows:2003_server:sp1_itanium:*:*:*:*:*:*
               cpe:2.3:o:microsoft:windows:2003_server:sp2:*:*:*:*:*:*
               cpe:2.3:o:microsoft:windows:2003_server:sp2_itanium:*:*:*:*:*:*
               cpe:2.3:o:microsoft:windows:2003_server:sp2_x64:*:*:*:*:*:*
               cpe:2.3:o:microsoft:windows:xp:sp3:*:*:*:*:*:*
               cpe:2.3:o:microsoft:windows:xp_professional:*:x64:*:*:*:*:*
               cpe:2.3:o:microsoft:windows:xp_professional:sp2_x64:*:*:*:*:*:*
               cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
               cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:3:*:as:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:3:*:desktop:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:3:*:es:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:3:*:ws:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:4:*:as:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:4:*:desktop:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:4:*:es:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:4:*:ws:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
               cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
          OR
               *cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*
               *cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*
               *cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*
Configuration 1
     AND
          OR
               cpe:2.3:o:canonical:ubuntu:6.06:*:lts:*:*:*:*:*
               cpe:2.3:o:canonical:ubuntu:7.04:*:*:*:*:*:*:*
               cpe:2.3:o:canonical:ubuntu:7.10:*:*:*:*:*:*:*
               cpe:2.3:o:canonical:ubuntu:8.04:*:lts:*:*:*:*:*
               cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*
               cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
               cpe:2.3:o:microsoft:windows:2003_server:*:x64:*:*:*:*:*
               cpe:2.3:o:microsoft:windows:2003_server:sp1:*:*:*:*:*:*
               cpe:2.3:o:microsoft:windows:2003_server:sp1_itanium:*:*:*:*:*:*
               cpe:2.3:o:microsoft:windows:2003_server:sp2:*:*:*:*:*:*
               cpe:2.3:o:microsoft:windows:2003_server:sp2_itanium:*:*:*:*:*:*
               cpe:2.3:o:microsoft:windows:2003_server:sp2_x64:*:*:*:*:*:*
               cpe:2.3:o:microsoft:windows:xp:sp3:*:*:*:*:*:*
               cpe:2.3:o:microsoft:windows:xp_professional:*:x64:*:*:*:*:*
               cpe:2.3:o:microsoft:windows:xp_professional:sp2_x64:*:*:*:*:*:*
               cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
               cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
               cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
               cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
          OR
               *cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*
               *cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*
               *cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*
Changed Reference Type
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc No Types Assigned
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc Vendor Advisory
Changed Reference Type
http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html No Types Assigned
http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html Technical Description
Changed Reference Type
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401 No Types Assigned
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401 Third Party Advisory
Changed Reference Type
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520 No Types Assigned
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520 Broken Link
Changed Reference Type
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368 No Types Assigned
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368 Broken Link
Changed Reference Type
http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html No Types Assigned
http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html Third Party Advisory
Changed Reference Type
http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html No Types Assigned
http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html Third Party Advisory
Changed Reference Type
http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html No Types Assigned
http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html Third Party Advisory
Changed Reference Type
http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html No Types Assigned
http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html Third Party Advisory
Changed Reference Type
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html No Types Assigned
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html Broken Link
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html Third Party Advisory