First published: Wed Apr 01 2015(Updated: )
The Multicast DNS (mDNS) responder in Synology DiskStation Manager (DSM) before 3.1 inadvertently responds to unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets to the Avahi component.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Synology DiskStation Manager | <=3.0 | |
Synology DiskStation Manager | <=3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2809 is considered to have a medium severity rating due to its potential for causing denial of service.
To fix CVE-2015-2809, users should upgrade to Synology DiskStation Manager version 3.1 or later.
CVE-2015-2809 can be exploited for denial of service attacks or to obtain sensitive information through traffic amplification.
CVE-2015-2809 affects all versions of Synology DiskStation Manager prior to version 3.1.
CVE-2015-2809 is relevant for devices running Synology DiskStation Manager versions before 3.1.