Implementations of UDP application protocol are vulnerable to network loops. An unauthenticated attacker can use maliciously-crafted packets against a vulnerable implementation that can lead to Denial of Service (DOS) and/or abuse of resources.
[
{
"vendor": "MikroTik",
"product": "RouterOS-TFTP",
"versions": [
{
"status": "affected",
"version": "*",
"versionType": "custom",
"lessThanOrEqual": "7.13.2"
}
]
},
{
"vendor": "Microsoft",
"product": "WDS",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"vendor": "dproxy-nexgen",
"product": "dproxy-nexgen",
"versions": [
{
"status": "affected",
"version": "0.1",
"versionType": "custom",
"lessThanOrEqual": "0.5"
}
]
}
]
[
{
"cpes": [
"cpe:2.3:a:mikrotik:routeros_tftp:*:*:*:*:*:*:*:*"
],
"vendor": "mikrotik",
"product": "routeros_tftp",
"versions": [
{
"status": "affected",
"version": "0",
"versionType": "custom",
"lessThanOrEqual": "7.13.2"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:a:microsoft:wds:*:*:*:*:*:*:*:*"
],
"vendor": "microsoft",
"product": "wds",
"versions": [
{
"status": "affected",
"version": "0",
"versionType": "custom",
"lessThanOrEqual": "*"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:a:dproxy-nexgen_project:dproxy-nexgen:-:*:*:*:*:*:*:*"
],
"vendor": "dproxy-nexgen_project",
"product": "dproxy-nexgen",
"versions": [
{
"status": "affected",
"version": "0.1",
"versionType": "custom",
"lessThanOrEqual": "0.5"
}
],
"defaultStatus": "unknown"
}
]