First published: Fri Jul 30 2021(Updated: )
A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/c-ares | <0:1.13.0-6.el8 | 0:1.13.0-6.el8 |
redhat/rh-nodejs14-nodejs | <0:14.17.5-1.el7 | 0:14.17.5-1.el7 |
redhat/rh-nodejs12-nodejs | <0:12.22.5-1.el7 | 0:12.22.5-1.el7 |
redhat/rh-nodejs12-nodejs-nodemon | <0:2.0.3-5.el7 | 0:2.0.3-5.el7 |
redhat/c-ares | <1.17.2 | 1.17.2 |
C-ares | >=1.0.0<1.17.2 | |
Red Hat Fedora | =33 | |
Red Hat Fedora | =34 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =7.7 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux Compute Node | =1 | |
Red Hat Enterprise Linux Server EUS | =7.7 | |
Red Hat Enterprise Linux Server EUS | =8.1 | |
Red Hat Enterprise Linux Server EUS | =8.2 | |
Red Hat Enterprise Linux Server EUS | =8.4 | |
Red Hat Enterprise Linux for IBM Z Systems | =8.0 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.1 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.2 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.4 | |
Red Hat Enterprise Linux for Power, little endian | =8.0 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.1 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.2 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.4 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =8.1 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =8.2 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =8.4 | |
Red Hat Enterprise Linux | =8.4 | |
Red Hat Enterprise Linux Workstation | =1 | |
Siemens SINEC Infrastructure Network Services | <1.0.1.1 | |
Langgenius Dify Node.js | >=12.0.0<=12.12.0 | |
Langgenius Dify Node.js | >=12.13.0<12.22.5 | |
Langgenius Dify Node.js | >=14.0.0<=14.14.0 | |
Langgenius Dify Node.js | >=14.15.0<14.17.5 | |
Langgenius Dify Node.js | >=16.0.0<16.6.2 | |
debounce | <=1.17.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-3672 is a vulnerability in the c-ares library that allows for potential domain hijacking due to a missing input validation check of host names returned by DNS.
The severity of CVE-2021-3672 is medium, with a severity score of 5.6.
The c-ares library versions up to and excluding 1.17.2 and specific versions of the rh-nodejs14-nodejs, rh-nodejs12-nodejs, and rh-nodejs12-nodejs-nodemon packages are affected.
To fix the CVE-2021-3672 vulnerability, update the c-ares library to version 1.17.2 or higher.
You can find more information about CVE-2021-3672 in the following references: [Bugzilla: 1992221](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1992221), [Bugzilla: 1992222](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1992222), [c-ares Advisory](https://c-ares.haxx.se/adv_20210810.html).