CVE-2022-34294

totd 1.5.3 uses a fixed UDP source port in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:totd_project:totd:1.5.3:*:*:*:*:*:*:*

History

21 Nov 2024, 07:09

Type Values Removed Values Added
References () https://github.com/fwdillema/totd - Third Party Advisory () https://github.com/fwdillema/totd - Third Party Advisory
References () https://www.blackhat.com/presentations/bh-jp-08/bh-jp-08-Kaminsky/BlackHat-Japan-08-Kaminsky-DNS08-BlackOps.pdf - Third Party Advisory () https://www.blackhat.com/presentations/bh-jp-08/bh-jp-08-Kaminsky/BlackHat-Japan-08-Kaminsky-DNS08-BlackOps.pdf - Third Party Advisory
References () https://www.openwall.com/lists/oss-security/2022/08/14/2 - Exploit, Mailing List, Third Party Advisory () https://www.openwall.com/lists/oss-security/2022/08/14/2 - Exploit, Mailing List, Third Party Advisory
References () https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner - Technical Description, Third Party Advisory () https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner - Technical Description, Third Party Advisory

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-74 CWE-331

Information

Published : 2022-08-15 12:15

Updated : 2024-11-21 07:09


NVD link : CVE-2022-34294

Mitre link : CVE-2022-34294

CVE.ORG link : CVE-2022-34294


JSON object : View

Products Affected

totd_project

  • totd
CWE
CWE-331

Insufficient Entropy