An issue was discovered in FNET through 4.6.4. The code that initializes the DNS client interface structure does not set sufficiently random transaction IDs (they are always set to 1 in _fnet_dns_poll in fnet_dns.c). This significantly simplifies DNS cache poisoning attacks.
References
Link | Resource |
---|---|
http://fnet.sourceforge.net/manual/fnet_history.html | Release Notes Third Party Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 | Third Party Advisory US Government Resource |
https://www.kb.cert.org/vuls/id/815128 | Third Party Advisory US Government Resource |
Configurations
History
No history.
Information
Published : 2020-12-11 23:15
Updated : 2024-02-04 21:23
NVD link : CVE-2020-17470
Mitre link : CVE-2020-17470
CVE.ORG link : CVE-2020-17470
JSON object : View
Products Affected
butok
- fnet
CWE
CWE-330
Use of Insufficiently Random Values