First published: Fri Jul 07 2017(Updated: )
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP | >=17.1.0<=17.1.2 | |
F5 BIG-IP | >=16.1.0<=16.1.5 | |
F5 BIG-IP | >=15.1.0<=15.1.10 | |
c-ares | =1.8.0 | |
c-ares | =1.9.0 | |
c-ares | =1.9.1 | |
c-ares | =1.10.0 | |
c-ares | =1.12.0 | |
c-ares | =1.11.0 | |
c-ares | =1.11.0-rc1 | |
Node.js | >=4.0.0<=4.1.2 | |
Node.js | >=4.2.0<4.8.4 | |
Node.js | >=5.0.0<=5.12.0 | |
Node.js | >=6.0.0<=6.8.1 | |
Node.js | >=6.9.0<6.11.1 | |
Node.js | >=7.0.0<7.10.1 | |
Node.js | >=8.0.0<8.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.