CVE-2015-2809
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Multicast DNS (mDNS) responder in Synology DiskStation Manager (DSM) before 3.1 inadvertently responds to unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets to the Avahi component.
El contestador Multicast DNS (mDNS) en Synology DiskStation Manager (DSM) anterior a 3.1 responde inadvertidamente a consultas unicast con las direcciones de fuentes que no son enlazadas locales, lo que permite a atacantes remotos causar una denegación de servicio (amplificación de trafico) o obtener información potencialmente sensible a través de paquetes UDP del puerto 5353 en el componente Avahi.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-03-31 CVE Reserved
- 2015-04-01 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.kb.cert.org/vuls/id/550620 | Third Party Advisory | |
http://www.kb.cert.org/vuls/id/BLUU-9TLSHD | Third Party Advisory | |
http://www.securityfocus.com/bid/73683 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Synology Search vendor "Synology" | Diskstation Manager Search vendor "Synology" for product "Diskstation Manager" | <= 3.0 Search vendor "Synology" for product "Diskstation Manager" and version " <= 3.0" | - |
Affected
|