Implementations of UDP application protocol are vulnerable to network loops. An unauthenticated attacker can use maliciously-crafted packets against a vulnerable implementation that can lead to Denial of Service (DOS) and/or abuse of resources.
[
{
"vendor": "MikroTik",
"product": "RouterOS-TFTP",
"versions": [
{
"status": "affected",
"version": "*",
"lessThanOrEqual": "7.13.2",
"versionType": "custom"
}
]
},
{
"vendor": "Microsoft",
"product": "WDS",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"vendor": "dproxy-nexgen",
"product": "dproxy-nexgen",
"versions": [
{
"status": "affected",
"version": "0.1",
"lessThanOrEqual": "0.5",
"versionType": "custom"
}
]
}
]