CVE-2022-30295

uClibc-ng through 1.0.40 and uClibc through 0.9.33.2 use predictable DNS transaction IDs that may lead to DNS cache poisoning. This is related to a reset of a value to 0x2.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:uclibc:uclibc:*:*:*:*:*:*:*:*
cpe:2.3:a:uclibc-ng_project:uclibc-ng:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:02

Type Values Removed Values Added
References () https://www.kb.cert.org/vuls/id/473698 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/473698 - Third Party Advisory, US Government Resource
References () https://www.nozominetworks.com/blog/nozomi-networks-discovers-unpatched-dns-bug-in-popular-c-standard-library-putting-iot-at-risk/ - Third Party Advisory () https://www.nozominetworks.com/blog/nozomi-networks-discovers-unpatched-dns-bug-in-popular-c-standard-library-putting-iot-at-risk/ - Third Party Advisory

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE NVD-CWE-noinfo CWE-330

Information

Published : 2022-05-06 05:15

Updated : 2024-11-21 07:02


NVD link : CVE-2022-30295

Mitre link : CVE-2022-30295

CVE.ORG link : CVE-2022-30295


JSON object : View

Products Affected

uclibc-ng_project

  • uclibc-ng

uclibc

  • uclibc
CWE
CWE-330

Use of Insufficiently Random Values