Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wr75-h66j-9v32

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Multicast DNS (mDNS) responder in IBM Security Access Manager for Web 7.x before 7.0.0 FP12 and 8.x before 8.0.1 FP1 inadvertently responds to unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets.

The Multicast DNS (mDNS) responder in IBM Security Access Manager for Web 7.x before 7.0.0 FP12 and 8.x before 8.0.1 FP1 inadvertently responds to unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets.

EPSS

Процентиль: 82%
0.0182
Низкий

Дефекты

CWE-200

Связанные уязвимости

nvd
почти 11 лет назад

The Multicast DNS (mDNS) responder in IBM Security Access Manager for Web 7.x before 7.0.0 FP12 and 8.x before 8.0.1 FP1 inadvertently responds to unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets.

EPSS

Процентиль: 82%
0.0182
Низкий

Дефекты

CWE-200