JVNDB-2015-000045
Vulnerability from jvndb - Published: 2015-03-27 14:12 - Updated:2015-03-27 14:12Summary
Android OS may behave as an open resolver
Details
A device that runs as a DNS cache server, which responds to any recursive DNS queries that are received is referred to as an open resolver.
Android OS contains an issue where it may behave as an open resolver when the tethering function is enabled.
Yasuhiro Orange Morishita of Japan Registry Services Co., Ltd. (JPRS) reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
| Type | URL | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000045.html",
"dc:date": "2015-03-27T14:12+09:00",
"dcterms:issued": "2015-03-27T14:12+09:00",
"dcterms:modified": "2015-03-27T14:12+09:00",
"description": "A device that runs as a DNS cache server, which responds to any recursive DNS queries that are received is referred to as an open resolver.\r\nAndroid OS contains an issue where it may behave as an open resolver when the tethering function is enabled.\r\n\r\nYasuhiro Orange Morishita of Japan Registry Services Co., Ltd. (JPRS) reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000045.html",
"sec:cpe": {
"#text": "cpe:/o:google:android",
"@product": "Android",
"@vendor": "Google",
"@version": "2.2"
},
"sec:cvss": {
"@score": "2.6",
"@severity": "Low",
"@type": "Base",
"@vector": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2015-000045",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN81094176/index.html",
"@id": "JVN#81094176",
"@source": "JVN"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-264",
"@title": "Permissions(CWE-264)"
}
],
"title": "Android OS may behave as an open resolver"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…