Vulnerability Note VU#210620

uIP and lwIP DNS resolver vulnerable to cache poisoning

Original Release date: 03 Nov 2014 | Last revised: 27 Aug 2015

Overview

The DNS resolver implemented in uIP and lwIP is vulnerable to cache poisoning due to non-randomized transaction IDs (TXIDs) and source port reuse.

Description

CWE-330: Use of Insufficiently Random Values - CVE-2014-4883

The DNS resolver implemented in all versions of uIP, as well as lwIP versions 1.4.1 and earlier, is vulnerable to cache poisoning due to non-randomized transaction IDs (TXIDs) and source port reuse.

For more information on the technical details and impact of this vulnerability, please refer to VU#800113.

Impact

A remote, unauthenticated attacker with the ability to conduct a successful cache poisoning attack can cause a nameserver's clients to contact the incorrect, and possibly malicious, hosts for particular services. Consequently, web traffic, email, and other important network data can be redirected to systems under the attacker's control.

Solution

Apply an Update

lwIP has committed a fix to the lwIP source repository. If possible, users and downstream developers should upgrade to lwIP git commit b8d798158bce0068260302371afb2b4ab4d3678a or greater.

uIP is now incorporated into the Contiki project. No patch has been made available by Contiki at this time.

Please refer to VU#800113 for additional remediation and mitigation suggestions.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Contiki OSAffected01 Sep 201427 Oct 2014
lwIPAffected14 Aug 201421 Oct 2014
Philips ElectronicsAffected09 Sep 201427 Aug 2015
ThingsquareUnknown11 Sep 201427 Oct 2014
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P
Temporal 5.0 E:U/RL:OF/RC:C
Environmental 5.0 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Allen D. Householder for reporting this vulnerability.

This document was written by Todd Lewellen.

Other Information

  • CVE IDs: CVE-2014-4883
  • Date Public: 03 Nov 2014
  • Date First Published: 03 Nov 2014
  • Date Last Updated: 27 Aug 2015
  • Document Revision: 19

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.