var-201504-0248
Vulnerability from variot

The Multicast DNS (mDNS) responder in Synology DiskStation Manager (DSM) before 3.1 inadvertently responds to unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets to the Avahi component. Multicast DNS implementations may respond to unicast queries that originate from sources outside of the local link network. Such responses may disclose information about network devices or be used in denial-of-service (DoS) amplification attacks. Multiple products are prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information or crash the system, resulting in a denial-of-service condition. Other attacks are also possible. Synology DiskStation Manager (DSM) is an operating system developed by Synology for network storage servers (NAS). The operating system can manage data, documents, photos, music and other information

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201504-0248",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "diskstation manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "synology",
        "version": "3.0"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "avahi mdns",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "canon",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "synology",
        "version": null
      },
      {
        "model": "diskstation manager",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "synology",
        "version": "3.1"
      },
      {
        "model": "diskstation manager",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "synology",
        "version": "3.0"
      },
      {
        "model": "color laserjet",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "47000"
      },
      {
        "model": "avahi",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avahi",
        "version": "0.6.26"
      },
      {
        "model": "avahi",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avahi",
        "version": "0.6.25"
      },
      {
        "model": "avahi",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avahi",
        "version": "0.6.24"
      },
      {
        "model": "avahi",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avahi",
        "version": "0.6.23"
      },
      {
        "model": "avahi",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avahi",
        "version": "0.6.20"
      },
      {
        "model": "avahi",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avahi",
        "version": "0.6.16"
      },
      {
        "model": "avahi",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avahi",
        "version": "0.6.15"
      },
      {
        "model": "avahi",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avahi",
        "version": "0.6.13"
      },
      {
        "model": "avahi",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avahi",
        "version": "0.6.11"
      },
      {
        "model": "avahi",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avahi",
        "version": "0.6.10"
      },
      {
        "model": "avahi",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avahi",
        "version": "0.6.9"
      },
      {
        "model": "avahi",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avahi",
        "version": "0.6.8"
      },
      {
        "model": "avahi",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avahi",
        "version": "0.6.7"
      },
      {
        "model": "avahi",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avahi",
        "version": "0.5.2"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#550620"
      },
      {
        "db": "BID",
        "id": "73683"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002046"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2809"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-655"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-2809"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Chad Seaman",
    "sources": [
      {
        "db": "BID",
        "id": "73683"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-2809",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2015-2809",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-80770",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2015-2809",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201503-655",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-80770",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-80770"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002046"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2809"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-655"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Multicast DNS (mDNS) responder in Synology DiskStation Manager (DSM) before 3.1 inadvertently responds to unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets to the Avahi component. Multicast DNS implementations may respond to unicast queries that originate from sources outside of the local link network. Such responses may disclose information about network devices or be used in denial-of-service (DoS) amplification attacks. Multiple products are prone to an information-disclosure vulnerability. \nAttackers can exploit this issue to obtain sensitive information or crash the system, resulting in a denial-of-service condition. Other attacks are also possible. Synology DiskStation Manager (DSM) is an operating system developed by Synology for network storage servers (NAS). The operating system can manage data, documents, photos, music and other information",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-2809"
      },
      {
        "db": "CERT/CC",
        "id": "VU#550620"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002046"
      },
      {
        "db": "BID",
        "id": "73683"
      },
      {
        "db": "VULHUB",
        "id": "VHN-80770"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#550620",
        "trust": 3.3
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2809",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "73683",
        "trust": 1.4
      },
      {
        "db": "JVN",
        "id": "JVNVU98589419",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002046",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-655",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-80770",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#550620"
      },
      {
        "db": "VULHUB",
        "id": "VHN-80770"
      },
      {
        "db": "BID",
        "id": "73683"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002046"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2809"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-655"
      }
    ]
  },
  "id": "VAR-201504-0248",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-80770"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:38:00.068000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "DiskStation Manager 5.1",
        "trust": 0.8,
        "url": "https://www.synology.com/en-global/dsm/"
      },
      {
        "title": "DSM_RS3411xs_1760",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54792"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002046"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-655"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-80770"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002046"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2809"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.kb.cert.org/vuls/id/550620"
      },
      {
        "trust": 2.5,
        "url": "http://www.kb.cert.org/vuls/id/bluu-9tlshd"
      },
      {
        "trust": 1.6,
        "url": "https://github.com/chadillac/mdns_recon"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/73683"
      },
      {
        "trust": 0.8,
        "url": "http://www.ietf.org/rfc/rfc6762.txt"
      },
      {
        "trust": 0.8,
        "url": "https://www.usa.canon.com/cusa/support/consumer?pagekeycode=prdadvdetail\u0026docid=0901e02480ea9d5d"
      },
      {
        "trust": 0.8,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21699497"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2809"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu98589419/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-2809"
      },
      {
        "trust": 0.8,
        "url": "https://tools.ietf.org/html/rfc6762#section-5.5"
      },
      {
        "trust": 0.8,
        "url": "http://lists.freedesktop.org/archives/avahi/2010-november/001952.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#550620"
      },
      {
        "db": "VULHUB",
        "id": "VHN-80770"
      },
      {
        "db": "BID",
        "id": "73683"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002046"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2809"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-655"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#550620"
      },
      {
        "db": "VULHUB",
        "id": "VHN-80770"
      },
      {
        "db": "BID",
        "id": "73683"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002046"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2809"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-655"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-03-31T00:00:00",
        "db": "CERT/CC",
        "id": "VU#550620"
      },
      {
        "date": "2015-04-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-80770"
      },
      {
        "date": "2015-03-31T00:00:00",
        "db": "BID",
        "id": "73683"
      },
      {
        "date": "2015-04-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-002046"
      },
      {
        "date": "2015-04-01T02:00:35.970000",
        "db": "NVD",
        "id": "CVE-2015-2809"
      },
      {
        "date": "2015-03-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201503-655"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-05-15T00:00:00",
        "db": "CERT/CC",
        "id": "VU#550620"
      },
      {
        "date": "2016-07-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-80770"
      },
      {
        "date": "2015-05-15T00:14:00",
        "db": "BID",
        "id": "73683"
      },
      {
        "date": "2015-04-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-002046"
      },
      {
        "date": "2016-07-29T19:08:16.193000",
        "db": "NVD",
        "id": "CVE-2015-2809"
      },
      {
        "date": "2015-04-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201503-655"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-655"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multicast DNS (mDNS) implementations may respond to unicast queries originating outside the local link",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#550620"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-655"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.