Vulnerability Details CVE-2014-4883
resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 30.9%
CVSS Severity
CVSS v2 Score 4.3
Products affected by CVE-2014-4883
-
cpe:2.3:a:lwip_project:lwip:-
-
cpe:2.3:a:lwip_project:lwip:0.2
-
cpe:2.3:a:lwip_project:lwip:0.3
-
cpe:2.3:a:lwip_project:lwip:0.3.1
-
cpe:2.3:a:lwip_project:lwip:0.4
-
cpe:2.3:a:lwip_project:lwip:0.4.1
-
cpe:2.3:a:lwip_project:lwip:0.4.2
-
cpe:2.3:a:lwip_project:lwip:0.5.0
-
cpe:2.3:a:lwip_project:lwip:0.5.1
-
cpe:2.3:a:lwip_project:lwip:0.5.2
-
cpe:2.3:a:lwip_project:lwip:0.5.3
-
cpe:2.3:a:lwip_project:lwip:0.6.1
-
cpe:2.3:a:lwip_project:lwip:0.6.2
-
cpe:2.3:a:lwip_project:lwip:0.6.3
-
cpe:2.3:a:lwip_project:lwip:0.6.4
-
cpe:2.3:a:lwip_project:lwip:0.6.5
-
cpe:2.3:a:lwip_project:lwip:0.6.6
-
cpe:2.3:a:lwip_project:lwip:0.7.0
-
cpe:2.3:a:lwip_project:lwip:1.1.0
-
cpe:2.3:a:lwip_project:lwip:1.1.1
-
cpe:2.3:a:lwip_project:lwip:1.2.0
-
cpe:2.3:a:lwip_project:lwip:1.3.0
-
cpe:2.3:a:lwip_project:lwip:1.3.1
-
cpe:2.3:a:lwip_project:lwip:1.3.2
-
cpe:2.3:a:lwip_project:lwip:1.4.0
-
cpe:2.3:a:lwip_project:lwip:1.4.1