CVE-2014-4883

Priority
Description
resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP
1.4.1 and earlier, does not use random values for ID fields and source
ports of DNS query packets, which makes it easier for man-in-the-middle
attackers to conduct cache-poisoning attacks via spoofed reply packets.
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 18.10 (Cosmic Cuttlefish):needed
Ubuntu 19.04 (Disco Dingo):needed
More Information

Updated: 2019-01-14 21:15:50 UTC (commit 51f9b73af244ba86b9321e46e526586c25a8e060)