CVE Vulnerabilities

CVE-2014-4883

Insufficient Verification of Data Authenticity

Published: Nov 28, 2014 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.

Weakness

The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.

Affected Software

NameVendorStart VersionEnd Version
LwipLwip_project*1.4.1 (including)
Lwipv6Ubuntuartful*
Lwipv6Ubuntubionic*
Lwipv6Ubuntucosmic*
Lwipv6Ubuntudevel*
Lwipv6Ubuntudisco*
Lwipv6Ubuntueoan*
Lwipv6Ubuntuesm-apps/bionic*
Lwipv6Ubuntuesm-apps/focal*
Lwipv6Ubuntuesm-apps/jammy*
Lwipv6Ubuntuesm-apps/noble*
Lwipv6Ubuntuesm-apps/xenial*
Lwipv6Ubuntufocal*
Lwipv6Ubuntugroovy*
Lwipv6Ubuntuhirsute*
Lwipv6Ubuntuimpish*
Lwipv6Ubuntujammy*
Lwipv6Ubuntukinetic*
Lwipv6Ubuntulucid*
Lwipv6Ubuntulunar*
Lwipv6Ubuntumantic*
Lwipv6Ubuntunoble*
Lwipv6Ubuntuoracular*
Lwipv6Ubuntuplucky*
Lwipv6Ubuntuprecise*
Lwipv6Ubuntuquesting*
Lwipv6Ubuntutrusty*
Lwipv6Ubuntuutopic*
Lwipv6Ubuntuvivid*
Lwipv6Ubuntuwily*
Lwipv6Ubuntuxenial*
Lwipv6Ubuntuyakkety*
Lwipv6Ubuntuzesty*

References