CVE-2014-4883

Priority
Description
resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP
1.4.1 and earlier, does not use random values for ID fields and source
ports of DNS query packets, which makes it easier for man-in-the-middle
attackers to conduct cache-poisoning attacks via spoofed reply packets.
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 18.10 (Cosmic Cuttlefish):needed
Ubuntu 19.04 (Disco Dingo):needed
More Information

Updated: 2019-03-26 11:15:53 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)