Vulnerability Description
uClibc-ng through 1.0.40 and uClibc through 0.9.33.2 use predictable DNS transaction IDs that may lead to DNS cache poisoning. This is related to a reset of a value to 0x2.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Uclibc | Uclibc | <= 0.9.33.2 |
| Uclibc-Ng Project | Uclibc-Ng | <= 1.0.40 |
Related Weaknesses (CWE)
References
- https://www.kb.cert.org/vuls/id/473698Third Party AdvisoryUS Government Resource
- https://www.nozominetworks.com/blog/nozomi-networks-discovers-unpatched-dns-bug-Third Party Advisory
- https://www.kb.cert.org/vuls/id/473698Third Party AdvisoryUS Government Resource
- https://www.nozominetworks.com/blog/nozomi-networks-discovers-unpatched-dns-bug-Third Party Advisory
FAQ
What is CVE-2022-30295?
CVE-2022-30295 is a vulnerability with a CVSS score of 6.5 (MEDIUM). uClibc-ng through 1.0.40 and uClibc through 0.9.33.2 use predictable DNS transaction IDs that may lead to DNS cache poisoning. This is related to a reset of a value to 0x2.
How severe is CVE-2022-30295?
CVE-2022-30295 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-30295?
Check the references section above for vendor advisories and patch information. Affected products include: Uclibc Uclibc, Uclibc-Ng Project Uclibc-Ng.