Описание
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.
Релиз | Статус | Примечание |
---|---|---|
bionic | not-affected | |
devel | released | 1.17.1-1 |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | |
esm-infra/focal | not-affected | |
esm-infra/xenial | not-affected | |
focal | not-affected | |
groovy | released | 1.16.1-1ubuntu0.1 |
precise/esm | DNE | |
trusty | ignored | end of standard support |
Показывать по
Ссылки на источники
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.
A Node.js application that allows an attacker to trigger a DNS request ...
5 Medium
CVSS2
7.5 High
CVSS3