|
[Japanese]
|
JVNDB-2017-000242
|
StreamRelay.net.exe and sDNSProxy.exe vulnerable to denial-of-service (DoS)
|
StreamRelay.net.exe and sDNSProxy.exe fail to properly process ICMP Port Unreachable message (CWE-703).
Tomoki Sanaki reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Tomoki Sanaki coordinated under the Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 7.5 (High) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
CVSS V2 Severity: Base Metrics 5.0 (Medium) [IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Partial
|
|
Tomoki Sanaki
- sDNSProxy.exe ver1.1.0.0 and earlier (CVE-2017-10895)
- StreamRelay.NET.exe ver2.14.0.7 and earlier (CVE-2017-10894)
|
|
A remote attacker may be able to cause a denial-of-service (DoS) condition.
|
[Update the Software]
Update to the latest version according to the information provided by the developer.
|
Tomoki Sanaki
|
- No Mapping(CWE-Other) [IPA Evaluation]
|
- CVE-2017-10894
- CVE-2017-10895
|
- JVN : JVN#71291160
- National Vulnerability Database (NVD) : CVE-2017-10894
- National Vulnerability Database (NVD) : CVE-2017-10895
|
- [2017/11/29]
Web page was published
- [2018/03/14]
References : Contents were added
|