Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r2m4-j583-8hw8

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.

resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.

EPSS

Процентиль: 31%
0.00114
Низкий

Дефекты

CWE-345

Связанные уязвимости

ubuntu
около 11 лет назад

resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.

nvd
около 11 лет назад

resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.

debian
около 11 лет назад

resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in ...

EPSS

Процентиль: 31%
0.00114
Низкий

Дефекты

CWE-345