Attackers at the destination may be able to spoof trusted servers to steal data or cause a denial of service.
There are at least two distinct weaknesses that can cause the product to communicate with an unintended destination:
| Scope | Impact | Likelihood |
|---|---|---|
| Access Control Other | Gain Privileges or Assume Identity, Varies by Context, Bypass Protection Mechanism Note: An attacker can access any functionality that is inadvertently accessible to the source. |
| References | Description |
|---|---|
CVE-2013-5211 | composite: NTP feature generates large responses (high amplification factor) with spoofed UDP source addresses. |
CVE-1999-0513 | Classic "Smurf" attack, using spoofed ICMP packets to broadcast addresses. |
CVE-1999-1379 | DNS query with spoofed source address causes more traffic to be returned to spoofed address than was sent by the attacker. |
| Name | Organization | Date | Date release | Version |
|---|---|---|---|---|
| CWE Content Team | MITRE | 2.6 |
| Name | Organization | Date | Comment |
|---|---|---|---|
| CWE Content Team | MITRE | updated Modes_of_Introduction, References, Relationships | |
| CWE Content Team | MITRE | updated Applicable_Platforms, Relationships | |
| CWE Content Team | MITRE | updated Maintenance_Notes | |
| CWE Content Team | MITRE | updated Description | |
| CWE Content Team | MITRE | updated References, Relationships | |
| CWE Content Team | MITRE | updated Mapping_Notes | |
| CWE Content Team | MITRE | updated References | |
| CWE Content Team | MITRE | updated Common_Consequences, Relationships, Weakness_Ordinalities |