The Multicast DNS (mDNS) responder in Synology DiskStation Manager (DSM) before 3.1 inadvertently responds to unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets to the Avahi component.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/550620 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/BLUU-9TLSHD | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/73683 | |
http://www.kb.cert.org/vuls/id/550620 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/BLUU-9TLSHD | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/73683 |
Configurations
History
21 Nov 2024, 02:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/550620 - Third Party Advisory, US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/BLUU-9TLSHD - Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/bid/73683 - |
Information
Published : 2015-04-01 02:00
Updated : 2024-11-21 02:28
NVD link : CVE-2015-2809
Mitre link : CVE-2015-2809
CVE.ORG link : CVE-2015-2809
JSON object : View
Products Affected
synology
- diskstation_manager
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor