5.3
CVE-2022-33989
- EPSS 0.3%
- Veröffentlicht 15.08.2022 13:15:18
- Zuletzt bearbeitet 21.11.2024 07:08:43
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
dproxy-nexgen (aka dproxy nexgen) uses a static UDP source port (selected randomly only at boot time) in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Dproxy-nexgen Project ≫ Dproxy-nexgen Version-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.3% | 0.527 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
|
CWE-331 Insufficient Entropy
The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.