Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xh69-987w-hrp8

Опубликовано: 15 июл. 2025
Источник: github
Github: Прошло ревью
CVSS4: 6.6
CVSS3: 5.3

Описание

resolv vulnerable to DoS via insufficient DNS domain name length validation

A denial of service vulnerability has been discovered in the resolv gem bundled with Ruby.

Details

The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet.

An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name.

This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

Affected Version

The vulnerability affects the resolv gem bundled with the following Ruby series:

  • Ruby 3.2 series: resolv version 0.2.2 and earlier
  • Ruby 3.3 series: resolv version 0.3.0
  • Ruby 3.4 series: resolv version 0.6.1 and earlier

Credits

Thanks to Manu for discovering this issue.

History

Originally published at 2025-07-08 07:00:00 (UTC)

Пакеты

Наименование

resolv

rubygems
Затронутые версииВерсия исправления

< 0.2.3

0.2.3

Наименование

resolv

rubygems
Затронутые версииВерсия исправления

>= 0.4.0, < 0.6.2

0.6.2

Наименование

resolv

rubygems
Затронутые версииВерсия исправления

>= 0.3.0, < 0.3.1

0.3.1

EPSS

Процентиль: 14%
0.00045
Низкий

6.6 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-1284
CWE-400

Связанные уязвимости

CVSS3: 7.5
ubuntu
6 месяцев назад

The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

CVSS3: 5.3
redhat
6 месяцев назад

The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

CVSS3: 7.5
nvd
6 месяцев назад

The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

CVSS3: 7.5
debian
6 месяцев назад

The attack vector is a potential Denial of Service (DoS). The vulnerab ...

suse-cvrf
2 месяца назад

Security update for ruby2.5

EPSS

Процентиль: 14%
0.00045
Низкий

6.6 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-1284
CWE-400