Executive Summary

Informations
Name CVE-2008-5133 First vendor Publication 2008-11-18
Vendor Cve Last vendor Modification 2017-08-08

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:P)
Cvss Base Score 5.8 Attack Range Network
Cvss Impact Score 4.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

ipnat in IP Filter in Sun Solaris 10 and OpenSolaris before snv_96, when running on a DNS server with Network Address Translation (NAT) configured, improperly changes the source port of a packet when the destination port is the DNS port, which allows remote attackers to bypass an intended CVE-2008-1447 protection mechanism and spoof the responses to DNS queries sent by named.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5133

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 304
Os 2

Open Source Vulnerability Database (OSVDB)

Id Description
49764 Solaris IP Filter (ipfilter(5)) DNS Query ID Field Prediction Cache Poisoning

Sources (Detail)

Source Url
SECUNIA http://secunia.com/advisories/32625
SUNALERT http://sunsolve.sun.com/search/document.do?assetkey=1-26-245206-1
VUPEN http://www.vupen.com/english/advisories/2008/3129
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/46721

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
Date Informations
2020-05-24 01:05:02
  • Multiple Updates
2020-05-23 00:22:36
  • Multiple Updates
2017-08-08 09:24:31
  • Multiple Updates
2016-04-27 09:32:42
  • Multiple Updates
2016-04-26 18:02:23
  • Multiple Updates
2013-05-11 00:30:51
  • Multiple Updates