// For flags

CVE-2020-17439

 

Severity Score

8.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that parses incoming DNS packets does not validate that the incoming DNS replies match outgoing DNS queries in newdata() in resolv.c. Also, arbitrary DNS replies are parsed if there was any outgoing DNS query with a transaction ID that matches the transaction ID of an incoming reply. Provided that the default DNS cache is quite small (only four records) and that the transaction ID has a very limited set of values that is quite easy to guess, this can lead to DNS cache poisoning.

Se detectó un problema en uIP versión 1.0, como es usado en Contiki versión 3.0 y otros productos. El código que analiza los paquetes DNS entrantes no comprueba que las respuestas DNS entrantes coincidan con las consultas DNS salientes en la función newdata() en el archivo resolv.c. Además, las respuestas DNS arbitrarias son analizadas si hubo alguna consulta DNS saliente con un ID de transacción que coincida con el ID de transacción de una respuesta entrante. Siempre que la caché de DNS predeterminada sea bastante pequeña (solo cuatro registros) y que el ID de transacción tenga un conjunto de valores muy limitado que sea bastante fácil de adivinar, esto puede conllevar a un envenenamiento de la caché de DNS

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-08-07 CVE Reserved
  • 2020-12-11 CVE Published
  • 2024-04-30 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
References (2)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Uip Project
Search vendor "Uip Project"
Uip
Search vendor "Uip Project" for product "Uip"
1.0
Search vendor "Uip Project" for product "Uip" and version "1.0"
-
Affected
in Contiki-os
Search vendor "Contiki-os"
Contiki
Search vendor "Contiki-os" for product "Contiki"
3.0
Search vendor "Contiki-os" for product "Contiki" and version "3.0"
-
Safe