resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.
References
Link | Resource |
---|---|
http://git.savannah.gnu.org/cgit/lwip.git/commit/?id=9fb46e120655ac481b2af8f865d5ae56c39b831a | Patch |
http://www.kb.cert.org/vuls/id/210620 | US Government Resource |
http://git.savannah.gnu.org/cgit/lwip.git/commit/?id=9fb46e120655ac481b2af8f865d5ae56c39b831a | Patch |
http://www.kb.cert.org/vuls/id/210620 | US Government Resource |
Configurations
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.savannah.gnu.org/cgit/lwip.git/commit/?id=9fb46e120655ac481b2af8f865d5ae56c39b831a - Patch | |
References | () http://www.kb.cert.org/vuls/id/210620 - US Government Resource |
Information
Published : 2014-11-28 02:59
Updated : 2024-11-21 02:11
NVD link : CVE-2014-4883
Mitre link : CVE-2014-4883
CVE.ORG link : CVE-2014-4883
JSON object : View
Products Affected
lwip_project
- lwip
CWE
CWE-345
Insufficient Verification of Data Authenticity