CVE-2014-4883

resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lwip_project:lwip:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:11

Type Values Removed Values Added
References () http://git.savannah.gnu.org/cgit/lwip.git/commit/?id=9fb46e120655ac481b2af8f865d5ae56c39b831a - Patch () http://git.savannah.gnu.org/cgit/lwip.git/commit/?id=9fb46e120655ac481b2af8f865d5ae56c39b831a - Patch
References () http://www.kb.cert.org/vuls/id/210620 - US Government Resource () http://www.kb.cert.org/vuls/id/210620 - US Government Resource

Information

Published : 2014-11-28 02:59

Updated : 2024-11-21 02:11


NVD link : CVE-2014-4883

Mitre link : CVE-2014-4883

CVE.ORG link : CVE-2014-4883


JSON object : View

Products Affected

lwip_project

  • lwip
CWE
CWE-345

Insufficient Verification of Data Authenticity