An issue was discovered in FNET through 4.6.4. The code that initializes the DNS client interface structure does not set sufficiently random transaction IDs (they are always set to 1 in _fnet_dns_poll in fnet_dns.c). This significantly simplifies DNS cache poisoning attacks.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 | Third Party Advisory US Government Resource |
http://fnet.sourceforge.net/manual/fnet_history.html | Release Notes Third Party Advisory |
https://www.kb.cert.org/vuls/id/815128 | Third Party Advisory US Government Resource |
Configurations
Information
Published : 2020-12-11 15:15
Updated : 2021-07-21 04:39
NVD link : CVE-2020-17470
Mitre link : CVE-2020-17470
JSON object : View
CWE
CWE-330
Use of Insufficiently Random Values
Products Affected
fnet_project
- fnet