CVE-2014-4883

Priority
Description
resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP
1.4.1 and earlier, does not use random values for ID fields and source
ports of DNS query packets, which makes it easier for man-in-the-middle
attackers to conduct cache-poisoning attacks via spoofed reply packets.
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 19.10 (Eoan Ermine):needed
Ubuntu 20.04 (Focal Fossa):needed
More Information

Updated: 2020-04-24 03:17:12 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)