Vulnerabilities > CVE-2008-1454 - Unspecified vulnerability in Microsoft products

047910
CVSS 9.4 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
microsoft
critical
nessus

Summary

Unspecified vulnerability in Microsoft DNS in Windows 2000 SP4, Server 2003 SP1 and SP2, and Server 2008 allows remote attackers to conduct cache poisoning attacks via unknown vectors related to accepting "records from a response that is outside the remote server's authority," aka "DNS Cache Poisoning Vulnerability," a different vulnerability than CVE-2008-1447.

Nessus

  • NASL familyDNS
    NASL idMS_DNS_KB951746.NASL
    descriptionAccording to its self-reported version number, the Microsoft DNS Server running on the remote host contains issues in the DNS library that could allow an attacker to send malicious DNS responses to DNS requests made by the remote host thereby spoofing or redirecting internet traffic from legitimate locations.
    last seen2020-06-01
    modified2020-06-02
    plugin id72834
    published2014-03-05
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/72834
    titleMS08-037: Vulnerabilities in DNS Could Allow Spoofing (951746) (uncredentialed check)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(72834);
      script_version("1.13");
      script_cvs_date("Date: 2018/11/15 20:50:21");
    
      script_cve_id("CVE-2008-1447", "CVE-2008-1454");
      script_bugtraq_id(30131, 30132);
      script_xref(name:"CERT", value:"800113");
      script_xref(name:"IAVA", value:"2008-A-0045");
      script_xref(name:"MSFT", value:"MS08-037");
      script_xref(name:"MSKB", value:"951746");
    
      script_name(english:"MS08-037: Vulnerabilities in DNS Could Allow Spoofing (951746) (uncredentialed check)");
      script_summary(english:"Checks version of Microsoft DNS Server");
    
      script_set_attribute(attribute:"synopsis", value:
    "The DNS server running on the remote host is vulnerable to DNS spoofing
    attacks.");
      script_set_attribute(attribute:"description", value:
    "According to its self-reported version number, the Microsoft DNS Server
    running on the remote host contains issues in the DNS library that could
    allow an attacker to send malicious DNS responses to DNS requests made
    by the remote host thereby spoofing or redirecting internet traffic from
    legitimate locations.");
      script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2008/ms08-037");
      script_set_attribute(attribute:"solution", value:
    "Microsoft has released patches for Windows 2000, 2003, and 2008
    Server.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2008-1454");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    script_set_attribute(attribute:"vuln_publication_date", value:"2008/07/08");
      script_set_attribute(attribute:"patch_publication_date", value:"2008/07/08");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/03/05");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
      script_set_attribute(attribute:"stig_severity", value:"I");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"DNS");
    
      script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");
    
      script_dependencies("ms_dns_version.nasl");
      script_require_keys("ms_dns/version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    version = get_kb_item_or_exit("ms_dns/version");
    port = 53;
    fix = NULL;
    
    
    # Windows Server 2008
    if (version =~ "^6\.0\.6001\.22\d{3}$" && ver_compare(ver:version, fix:"6.0.6001.22192") == -1)
      fix = "6.0.6001.22192";
    else if (version =~ "^6\.0\.6001\.18\d{3}$" && ver_compare(ver:version, fix:"6.0.6001.18081") == -1)
      fix = "6.0.6001.18081";
    # Windows Server 2003
    else if (version =~ "^5\.2\.3790\.")
    {
      # SP2
      if (
        ver_compare(ver:version, fix:"5.2.3790.3959") >= 0 &&
        ver_compare(ver:version, fix:"5.2.3790.4318") == -1
      )
        fix = "5.2.3790.4318";
    
      # SP1
      else if (ver_compare(ver:version, fix:"5.2.3790.3161") == -1)
        fix = "5.2.3790.3161";
      else
        audit(AUDIT_LISTEN_NOT_VULN, "Microsoft DNS Server", port, version, "UDP");
    }
    # Windows Server 2000
    else if (version =~ "^5\.0\.2195\." && ver_compare(ver:version, fix:"5.0.2195.7162") == -1)
      fix = "5.0.2195.7162";
    else
      audit(AUDIT_LISTEN_NOT_VULN, "Microsoft DNS Server", port, version, "UDP");
    
    
    if (report_verbosity > 0)
    {
      report =
        '\n  Installed version : ' + version +
        '\n  Fixed version     : ' + fix +
        '\n';
      security_hole(port:port, proto:"udp", extra:report);
    }
    else security_hole(port:port, proto:"udp");
    
  • NASL familyWindows : Microsoft Bulletins
    NASL idSMB_NT_MS08-037.NASL
    descriptionFlaws in the remote DNS library may let an attacker send malicious DNS responses to DNS requests made by the remote host, thereby spoofing or redirecting internet traffic from legitimate locations.
    last seen2020-06-01
    modified2020-06-02
    plugin id33441
    published2008-07-08
    reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/33441
    titleMS08-037: Vulnerabilities in DNS Could Allow Spoofing (953230)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
     script_id(33441);
     script_version("1.33");
     script_cvs_date("Date: 2018/11/15 20:50:30");
    
     script_cve_id("CVE-2008-1447", "CVE-2008-1454");
     script_bugtraq_id(30131, 30132);
     script_xref(name:"CERT", value:"800113");
     script_xref(name:"MSFT", value:"MS08-037");
     script_xref(name:"MSKB", value:"951746");
     script_xref(name:"MSKB", value:"951748");
     script_xref(name:"IAVA", value:"2008-A-0045");
    
     script_name(english:"MS08-037: Vulnerabilities in DNS Could Allow Spoofing (953230)");
     script_summary(english:"Determines the presence of update 953230");
    
     script_set_attribute(attribute:"synopsis", value:"The remote host is vulnerable to DNS spoofing attacks.");
     script_set_attribute(attribute:"description", value:
    "Flaws in the remote DNS library may let an attacker send malicious DNS
    responses to DNS requests made by the remote host, thereby spoofing or
    redirecting internet traffic from legitimate locations.");
     script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2008/ms08-037");
     script_set_attribute(attribute:"solution", value:
    "Microsoft has released patches for Windows 2000, XP, and 2003
    Server.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
     script_set_attribute(attribute:"vuln_publication_date", value:"2008/07/08");
     script_set_attribute(attribute:"patch_publication_date", value:"2008/07/08");
     script_set_attribute(attribute:"plugin_publication_date", value:"2008/07/08");
    
     script_set_attribute(attribute:"plugin_type", value:"local");
     script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
     script_set_attribute(attribute:"stig_severity", value:"I");
     script_end_attributes();
    
     script_category(ACT_GATHER_INFO);
    
     script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");
     script_family(english:"Windows : Microsoft Bulletins");
    
     script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
     script_require_keys("SMB/MS_Bulletin_Checks/Possible");
     script_require_ports(139, 445, 'Host/patch_management_checks');
     exit(0);
    }
    
    include("audit.inc");
    include("smb_func.inc");
    include("smb_hotfixes.inc");
    include("smb_hotfixes_fcheck.inc");
    include("misc_func.inc");
    
    get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");
    
    bulletin = 'MS08-037';
    dnsapi_kb = '951748';
    dnsexe_kb = '951746';
    
    kbs = make_list(dnsapi_kb, dnsexe_kb);
    if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);
    
    get_kb_item_or_exit("SMB/Registry/Enumerated");
    get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);
    
    if (hotfix_check_sp_range(win2k:'4,5', xp:'2,3', win2003:'1,2', vista:'1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);
    
    rootfile = hotfix_get_systemroot();
    if (!rootfile) exit(1, "Failed to get the system root.");
    
    share = hotfix_path2share(path:rootfile);
    if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);
    
    if ( get_kb_item("SMB/Registry/HKLM/SYSTEM/CurrentControlSet/Services/DNS/DisplayName") )
    	is_dns_svr = TRUE;
    else
    	is_dns_svr = FALSE;
    
    if (
      (is_dns_svr && hotfix_is_vulnerable(os:"6.0", sp:1, file:"dns.exe", version:"6.0.6001.18081", dir:"\system32", bulletin:bulletin, kb:dnsexe_kb)) ||
      (is_dns_svr && hotfix_is_vulnerable(os:"6.0", sp:1, file:"dns.exe", version:"6.0.6001.22192", min_version:"6.0.6001.22000", dir:"\system32", bulletin:bulletin, kb:dnsexe_kb)) ||
      hotfix_is_vulnerable(os:"5.2", sp:2, file:"dnsapi.dll", version:"5.2.3790.4318", dir:"\system32", bulletin:bulletin, kb:dnsapi_kb) ||
      (is_dns_svr && hotfix_is_vulnerable(os:"5.2", sp:2, file:"dns.exe", version:"5.2.3790.4318", dir:"\system32", bulletin:bulletin, kb:dnsexe_kb)) ||
      hotfix_is_vulnerable(os:"5.2", sp:1, file:"dnsapi.dll", version:"5.2.3790.3161", dir:"\system32", bulletin:bulletin, kb:dnsapi_kb) ||
      (is_dns_svr && hotfix_is_vulnerable(os:"5.2", sp:1, file:"dns.exe", version:"5.2.3790.3161", dir:"\system32", bulletin:bulletin, kb:dnsexe_kb)) ||
      hotfix_is_vulnerable(os:"5.1", sp:2, file:"dnsapi.dll", version:"5.1.2600.3394", dir:"\system32", bulletin:bulletin, kb:dnsapi_kb) ||
      hotfix_is_vulnerable(os:"5.1", sp:3, file:"dnsapi.dll", version:"5.1.2600.5625", dir:"\system32", bulletin:bulletin, kb:dnsapi_kb) ||
      hotfix_is_vulnerable(os:"5.0", file:"dnsapi.dll", version:"5.0.2195.7280", dir:"\system32", bulletin:bulletin, kb:dnsapi_kb) ||
      (is_dns_svr && hotfix_is_vulnerable(os:"5.0", file:"dns.exe", version:"5.0.2195.7162", dir:"\system32", bulletin:bulletin, kb:dnsexe_kb))
    )
    {
      set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
      hotfix_security_warning();
      hotfix_check_fversion_end();
      exit(0);
    }
    else
    {
      hotfix_check_fversion_end();
      audit(AUDIT_HOST_NOT, 'affected');
    }
    

Oval

accepted2011-11-14T04:00:28.614-05:00
classvulnerability
contributors
  • nameJeff Ito
    organizationSecure Elements, Inc.
  • nameChandan S
    organizationSecPod Technologies
definition_extensions
  • commentMicrosoft Windows 2000 SP4 or later is installed
    ovaloval:org.mitre.oval:def:229
  • commentMicrosoft Windows Server 2003 SP1 (x86) is installed
    ovaloval:org.mitre.oval:def:565
  • commentMicrosoft Windows Server 2003 (x64) is installed
    ovaloval:org.mitre.oval:def:730
  • commentMicrosoft Windows Server 2003 SP1 for Itanium is installed
    ovaloval:org.mitre.oval:def:1205
  • commentMicrosoft Windows Server 2003 SP2 (x86) is installed
    ovaloval:org.mitre.oval:def:1935
  • commentMicrosoft Windows Server 2003 SP2 (x64) is installed
    ovaloval:org.mitre.oval:def:2161
  • commentMicrosoft Windows Server 2003 (ia64) SP2 is installed
    ovaloval:org.mitre.oval:def:1442
  • commentMicrosoft Windows Server 2008 (32-bit) is installed
    ovaloval:org.mitre.oval:def:4870
  • commentMicrosoft Windows Server 2008 (64-bit) is installed
    ovaloval:org.mitre.oval:def:5356
descriptionUnspecified vulnerability in Microsoft DNS in Windows 2000 SP4, Server 2003 SP1 and SP2, and Server 2008 allows remote attackers to conduct cache poisoning attacks via unknown vectors related to accepting "records from a response that is outside the remote server's authority," aka "DNS Cache Poisoning Vulnerability," a different vulnerability than CVE-2008-1447.
familywindows
idoval:org.mitre.oval:def:5380
statusaccepted
submitted2008-07-08T14:18:00
titleDNS Cache Poisoning Vulnerability
version72

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 30132 CVE(CAN) ID: CVE-2008-1454 Microsoft Windows是微软发布的非常流行的操作系统。 Windows系统的DNS服务实现上存在漏洞,在某些情况下Windows的DNS服务器可能接受远程服务器权威以外的响应。未经认证的远程攻击者可以向有漏洞系统的DNS请求回复恶意响应,从而使DNS缓存中毒,并将Internet通讯从合法位置重定向至其他位置。 Microsoft Windows Server 2008 Microsoft Windows Server 2003 SP2 Microsoft Windows Server 2003 SP1 Microsoft Windows 2000SP4 Microsoft --------- Microsoft已经为此发布了一个安全公告(MS08-037)以及相应补丁: MS08-037:Vulnerabilities in DNS Could Allow Spoofing (953230) 链接:<a href=http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx?pf=true target=_blank>http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx?pf=true</a>
idSSV:3583
last seen2017-11-19
modified2008-07-10
published2008-07-10
reporterRoot
titleMicrosoft Windows DNS服务器缓存中毒漏洞(MS08-037)