The DNS resolver implemented in uIP and lwIP is vulnerable to cache poisoning due to non-randomized transaction IDs (TXIDs) and source port reuse.
CWE-330: Use of Insufficiently Random Values - CVE-2014-4883
The DNS resolver implemented in all versions of uIP, as well as lwIP versions 1.4.1 and earlier, is vulnerable to cache poisoning due to non-randomized transaction IDs (TXIDs) and source port reuse.
A remote, unauthenticated attacker with the ability to conduct a successful cache poisoning attack can cause a nameserver's clients to contact the incorrect, and possibly malicious, hosts for particular services. Consequently, web traffic, email, and other important network data can be redirected to systems under the attacker's control.
Apply an Update
Thanks to Allen D. Householder for reporting this vulnerability.
This document was written by Todd Lewellen.
|Date First Published:||2014-11-03|
|Date Last Updated:||2017-02-13 18:21 UTC|