Vulnerability Note VU#210620
uIP and lwIP DNS resolver vulnerable to cache poisoning
The DNS resolver implemented in uIP and lwIP is vulnerable to cache poisoning due to non-randomized transaction IDs (TXIDs) and source port reuse.
CWE-330: Use of Insufficiently Random Values - CVE-2014-4883
The DNS resolver implemented in all versions of uIP, as well as lwIP versions 1.4.1 and earlier, is vulnerable to cache poisoning due to non-randomized transaction IDs (TXIDs) and source port reuse.
A remote, unauthenticated attacker with the ability to conduct a successful cache poisoning attack can cause a nameserver's clients to contact the incorrect, and possibly malicious, hosts for particular services. Consequently, web traffic, email, and other important network data can be redirected to systems under the attacker's control.
Apply an Update
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Contiki OS||Affected||01 Sep 2014||27 Oct 2014|
|lwIP||Affected||14 Aug 2014||21 Oct 2014|
|Philips Electronics||Affected||09 Sep 2014||27 Aug 2015|
|Thingsquare||Unknown||11 Sep 2014||27 Oct 2014|
CVSS Metrics (Learn More)
Thanks to Allen D. Householder for reporting this vulnerability.
This document was written by Todd Lewellen.
- CVE IDs: CVE-2014-4883
- Date Public: 03 Nov 2014
- Date First Published: 03 Nov 2014
- Date Last Updated: 27 Aug 2015
- Document Revision: 19
If you have feedback, comments, or additional information about this vulnerability, please send us email.