Published:2017/11/29  Last Updated:2017/11/29

JVN#71291160
StreamRelay.net.exe and sDNSProxy.exe vulnerable to denial-of-service (DoS)

Overview

StreamRelay.net.exe and sDNSProxy.exe contains a denial-of-service (DoS) vulnerability.

Products Affected

  • StreamRelay.NET.exe ver2.14.0.7 and earlier (CVE-2017-10894)
  • sDNSProxy.exe ver1.1.0.0 and earlier (CVE-2017-10895)

Description

StreamRelay.net.exe and sDNSProxy.exe fail to properly process ICMP Port Unreachable message (CWE-703). 
 

Impact

A remote attacker may be able to cause a denial-of-service (DoS) condition.

Solution

Update the Software
Update to the latest version according to the information provided by the developer.

Vendor Status

Vendor Status Last Update Vendor Notes
Tomoki Sanaki Vulnerable 2017/11/29

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score: 7.5
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:N/AC:L/Au:N/C:N/I:N/A:P
Base Score: 5.0
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Credit

Tomoki Sanaki reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Tomoki Sanaki coordinated under the Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2017-10894
CVE-2017-10895
JVN iPedia JVNDB-2017-000242