NETGEAR WNR1000v3 devices with firmware 1.0.2.68 use the same source port number for every DNS query, which makes it easier for remote attackers to spoof responses by selecting that number for the destination port.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/78873 | |
https://www.kb.cert.org/vuls/id/403568 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/78873 | |
https://www.kb.cert.org/vuls/id/403568 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/78873 - | |
References | () https://www.kb.cert.org/vuls/id/403568 - Third Party Advisory, US Government Resource |
Information
Published : 2015-12-27 03:59
Updated : 2024-11-21 02:38
NVD link : CVE-2015-8263
Mitre link : CVE-2015-8263
CVE.ORG link : CVE-2015-8263
JSON object : View
Products Affected
netgear
- wnr1000v3
- wnr1000v3_firmware
CWE