First published: Fri Jul 30 2021(Updated: )
A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/c-ares | <0:1.13.0-6.el8 | 0:1.13.0-6.el8 |
redhat/rh-nodejs14-nodejs | <0:14.17.5-1.el7 | 0:14.17.5-1.el7 |
redhat/rh-nodejs12-nodejs | <0:12.22.5-1.el7 | 0:12.22.5-1.el7 |
redhat/rh-nodejs12-nodejs-nodemon | <0:2.0.3-5.el7 | 0:2.0.3-5.el7 |
redhat/c-ares | <1.17.2 | 1.17.2 |
c-ares | >=1.0.0<1.17.2 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =7.7 | |
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise linux computer node | =1 | |
redhat enterprise Linux eus | =7.7 | |
redhat enterprise Linux eus | =8.1 | |
redhat enterprise Linux eus | =8.2 | |
redhat enterprise Linux eus | =8.4 | |
redhat enterprise Linux for ibm z systems | =8.0 | |
redhat enterprise Linux for ibm z systems eus | =8.1 | |
redhat enterprise Linux for ibm z systems eus | =8.2 | |
redhat enterprise Linux for ibm z systems eus | =8.4 | |
redhat enterprise Linux for power little endian | =8.0 | |
redhat enterprise Linux for power little endian eus | =8.1 | |
redhat enterprise Linux for power little endian eus | =8.2 | |
redhat enterprise Linux for power little endian eus | =8.4 | |
redhat enterprise Linux server aus | =8.2 | |
redhat enterprise Linux server aus | =8.4 | |
redhat enterprise Linux server tus | =8.2 | |
redhat enterprise Linux server tus | =8.4 | |
redhat enterprise Linux server update services for sap solutions | =8.1 | |
redhat enterprise Linux server update services for sap solutions | =8.2 | |
redhat enterprise Linux server update services for sap solutions | =8.4 | |
redhat enterprise linux tus | =8.4 | |
redhat enterprise Linux workstation | =1 | |
siemens sinec infrastructure network services | <1.0.1.1 | |
Node.js | >=12.0.0<=12.12.0 | |
Node.js | >=12.13.0<12.22.5 | |
Node.js | >=14.0.0<=14.14.0 | |
Node.js | >=14.15.0<14.17.5 | |
Node.js | >=16.0.0<16.6.2 | |
pgbouncer | <=1.17.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-3672 is a vulnerability in the c-ares library that allows for potential domain hijacking due to a missing input validation check of host names returned by DNS.
The severity of CVE-2021-3672 is medium, with a severity score of 5.6.
The c-ares library versions up to and excluding 1.17.2 and specific versions of the rh-nodejs14-nodejs, rh-nodejs12-nodejs, and rh-nodejs12-nodejs-nodemon packages are affected.
To fix the CVE-2021-3672 vulnerability, update the c-ares library to version 1.17.2 or higher.
You can find more information about CVE-2021-3672 in the following references: [Bugzilla: 1992221](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1992221), [Bugzilla: 1992222](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1992222), [c-ares Advisory](https://c-ares.haxx.se/adv_20210810.html).