First published: Fri Jul 07 2017(Updated: )
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CwpAPI | =1.8.0 | |
CwpAPI | =1.9.0 | |
CwpAPI | =1.9.1 | |
CwpAPI | =1.10.0 | |
CwpAPI | =1.12.0 | |
c-ares | =1.11.0 | |
c-ares | =1.11.0-rc1 | |
Node.js | >=4.0.0<=4.1.2 | |
Node.js | >=4.2.0<4.8.4 | |
Node.js | >=5.0.0<=5.12.0 | |
Node.js | >=6.0.0<=6.8.1 | |
Node.js | >=6.9.0<6.11.1 | |
Node.js | >=7.0.0<7.10.1 | |
Node.js | >=8.0.0<8.1.4 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.2 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000381 has a medium severity rating due to the potential for memory exposure.
To fix CVE-2017-1000381, update affected F5 BIG-IP and c-ares software to the latest patched versions.
CVE-2017-1000381 affects specific versions of F5 BIG-IP and c-ares, particularly versions 1.8.0 through 1.12.0 of c-ares.
The potential impacts of CVE-2017-1000381 include unauthorized memory access and possible exploitation if a crafted DNS response is processed.
As of the last known reports, there is no evidence that CVE-2017-1000381 is actively being exploited in the wild.