resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.
References
Link | Resource |
---|---|
http://git.savannah.gnu.org/cgit/lwip.git/commit/?id=9fb46e120655ac481b2af8f865d5ae56c39b831a | Patch |
http://www.kb.cert.org/vuls/id/210620 | US Government Resource |
Configurations
Information
Published : 2014-11-27 18:59
Updated : 2015-01-08 11:56
NVD link : CVE-2014-4883
Mitre link : CVE-2014-4883
JSON object : View
CWE
CWE-345
Insufficient Verification of Data Authenticity
Products Affected
lwip_project
- lwip