{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Microsoft Windows Server 2003 x64 Edition Service Pack 2 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Windows Server 2003 x64 Edition ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft XP Professional x64 Edition Service Pack 2 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Windows Server 2003 Service Pack 1 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Windows XP Service Pack 2 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft XP Professional x64 Edition ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Windows Server 2008 (syst\u00e8mes 32-bit et x64).","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Windows Server 2003 SP1 et SP2 pour syst\u00e8mes Itanium ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Windows Server 2003 Service Pack 2 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Windows 2000 Server Service Pack 4 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Windows XP Service Pack 3 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Windows 2000 Service Pack 4 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nDeux vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es sur les mises en \u0153uvre DNS sous\nWindows. La premi\u00e8re concerne la mise en \u0153uvre des requ\u00eates DNS \u00e9mises\npar un client ou un serveur. Le port source \u00e9tant pr\u00e9visible, il suffit\nsous certaines conditions, pour forger une r\u00e9ponse malveillante, de\ndeviner l'identifiant de transaction (dont la g\u00e9n\u00e9ration a fait l'objet\nd'un correctif d\u00e9crit dans MS08-020). Cette mesure n'est pas suffisante.\nUne seconde vuln\u00e9rabilit\u00e9 concerne l'op\u00e9ration de mise en cache pour le\nserveur DNS. Ce dernier accepte sous certaines conditions de mettre en\ncache des r\u00e9ponses malveillantes. Les d\u00e9tails pr\u00e9cis de cette\nvuln\u00e9rabilit\u00e9 ne sont cependant pas connus \u00e0 la date de r\u00e9daction de cet\navis.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 MS08-037 de Microsoft pour\nl'obtention des correctifs (cf. section Documentation).\n","cves":[{"name":"CVE-2008-1454","url":"https://www.cve.org/CVERecord?id=CVE-2008-1454"},{"name":"CVE-2008-1447","url":"https://www.cve.org/CVERecord?id=CVE-2008-1447"}],"links":[{"title":"Bloc-notes de Microsoft SVRD, \"MS08-037 : More entropy for    the DNS resolver\"\u00a0:","url":"http://blogs.technet.com/swi/archive/2008/07/08/ms08-037-more-entropy-in-the-dns-resolver.aspx"}],"reference":"CERTA-2008-AVI-353","revisions":[{"description":"version initiale.","revision_date":"2008-07-09T00:00:00.000000"}],"risks":[{"description":"Contournement de la politique de s\u00e9curit\u00e9"}],"summary":"Deux vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es sur les mises en \u0153uvre DNS sous\nWindows. Elles impliquent le client ainsi que le serveur. L'exploitation\nde ces derni\u00e8res permet sous certaines conditions de corrompre le cache\net de rediriger le trafic d'utilisateurs vers des syst\u00e8mes ill\u00e9gitimes.\n","title":"Vuln\u00e9rabilit\u00e9 DNS dans Microsoft Windows","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Microsoft MS08-037 du 08 juillet 2008","url":"http://www.microsoft.com/technet/security/Bulletin/MS08-037.mspx"}]}
