Overview
The DNS resolver implemented in uIP and lwIP is vulnerable to cache poisoning due to non-randomized transaction IDs (TXIDs) and source port reuse.
Description
CWE-330: Use of Insufficiently Random Values - CVE-2014-4883 The DNS resolver implemented in all versions of uIP, as well as lwIP versions 1.4.1 and earlier, is vulnerable to cache poisoning due to non-randomized transaction IDs (TXIDs) and source port reuse. |
Impact
A remote, unauthenticated attacker with the ability to conduct a successful cache poisoning attack can cause a nameserver's clients to contact the incorrect, and possibly malicious, hosts for particular services. Consequently, web traffic, email, and other important network data can be redirected to systems under the attacker's control. |
Solution
Apply an Update |
Vendor Information
CVSS Metrics
| Group | Score | Vector |
|---|---|---|
| Base | 6.8 | AV:N/AC:M/Au:N/C:P/I:P/A:P |
| Temporal | 5 | E:U/RL:OF/RC:C |
| Environmental | 5.0 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Allen D. Householder for reporting this vulnerability.
This document was written by Todd Lewellen.
Other Information
| CVE IDs: | CVE-2014-4883 |
| Date Public: | 2014-11-03 |
| Date First Published: | 2014-11-03 |
| Date Last Updated: | 2017-02-13 18:21 UTC |
| Document Revision: | 25 |