Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-23386

Опубликовано: 20 мая 2021
Источник: redhat
CVSS3: 6.3

Описание

This affects the package dns-packet before 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.

Remote memory exposure vulnerability was found in nodejs dns-packet library. The buffers (created with allocUnsafe) are not always filled before forming the network packets and an attacker can use this vulnerability to potentially get access to internal application memory over non encrypted networks when querying crafted invalid domain names.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 2.0servicemesh-prometheusAffected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/console-rhel8Not affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/kui-web-terminal-rhel8Not affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/search-ui-rhel8Not affected
Red Hat Fuse 7apicuritoNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-prometheusWill not fix
Red Hat OpenShift Container Platform 4openshift4/ose-thanos-rhel8Will not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1964072dns-packet: does not always fill buffers before forming network packets which couls result in Remote Memory Exposure

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.7
nvd
больше 4 лет назад

This affects the package dns-packet before 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.

CVSS3: 7.7
github
больше 4 лет назад

Potential memory exposure in dns-packet

6.3 Medium

CVSS3