CVE-2015-2809

The Multicast DNS (mDNS) responder in Synology DiskStation Manager (DSM) before 3.1 inadvertently responds to unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets to the Avahi component.
References
Link Resource
http://www.kb.cert.org/vuls/id/550620 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/BLUU-9TLSHD Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/73683
http://www.kb.cert.org/vuls/id/550620 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/BLUU-9TLSHD Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/73683
Configurations

Configuration 1 (hide)

cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:28

Type Values Removed Values Added
References () http://www.kb.cert.org/vuls/id/550620 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/550620 - Third Party Advisory, US Government Resource
References () http://www.kb.cert.org/vuls/id/BLUU-9TLSHD - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/BLUU-9TLSHD - Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/73683 - () http://www.securityfocus.com/bid/73683 -

Information

Published : 2015-04-01 02:00

Updated : 2024-11-21 02:28


NVD link : CVE-2015-2809

Mitre link : CVE-2015-2809

CVE.ORG link : CVE-2015-2809


JSON object : View

Products Affected

synology

  • diskstation_manager
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor