First published: Fri May 06 2022(Updated: )
uClibc-ng through 1.0.40 and uClibc through 0.9.33.2 use predictable DNS transaction IDs that may lead to DNS cache poisoning. This is related to a reset of a value to 0x2.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Uclibc Uclibc | <=0.9.33.2 | |
Uclibc-ng Project Uclibc-ng | <=1.0.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30295 is considered to be a high-severity vulnerability due to its potential for DNS cache poisoning.
To fix CVE-2022-30295, you should update uClibc-ng to version 1.0.41 or higher, or uClibc to version 0.9.33.3 or higher.
CVE-2022-30295 affects uClibc-ng versions up to and including 1.0.40 and uClibc versions up to and including 0.9.33.2.
CVE-2022-30295 can be exploited to conduct DNS cache poisoning attacks, which may lead to redirects or spoofing.
Currently, the best mitigation for CVE-2022-30295 is to patch the affected versions of uClibc or uClibc-ng.