Overview
The DNS resolver implemented in uIP and lwIP is vulnerable to cache poisoning due to non-randomized transaction IDs (TXIDs) and source port reuse.
Description
CWE-330: Use of Insufficiently Random Values - CVE-2014-4883 The DNS resolver implemented in all versions of uIP, as well as lwIP versions 1.4.1 and earlier, is vulnerable to cache poisoning due to non-randomized transaction IDs (TXIDs) and source port reuse. |
Impact
A remote, unauthenticated attacker with the ability to conduct a successful cache poisoning attack can cause a nameserver's clients to contact the incorrect, and possibly malicious, hosts for particular services. Consequently, web traffic, email, and other important network data can be redirected to systems under the attacker's control. |
Solution
Apply an Update |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 6.8 | AV:N/AC:M/Au:N/C:P/I:P/A:P |
Temporal | 5 | E:U/RL:OF/RC:C |
Environmental | 5.0 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Allen D. Householder for reporting this vulnerability.
This document was written by Todd Lewellen.
Other Information
CVE IDs: | CVE-2014-4883 |
Date Public: | 2014-11-03 |
Date First Published: | 2014-11-03 |
Date Last Updated: | 2017-02-13 18:21 UTC |
Document Revision: | 25 |