CVE-2022-34294

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-34294
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-34294.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-34294
Published
2022-08-15T12:15:19Z
Modified
2025-01-08T09:01:48.567836Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

totd 1.5.3 uses a fixed UDP source port in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks.

References

Affected packages

Git / github.com/fwdillema/totd

Affected ranges

Type
GIT
Repo
https://github.com/fwdillema/totd
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.5.2
1.5.3
1.5.3-pre