First published: Wed Nov 10 2021(Updated: )
In uClibc and uClibc-ng before 1.0.39, incorrect handling of special characters in domain names returned by DNS servers via gethostbyname, getaddrinfo, gethostbyaddr, and getnameinfo can lead to output of wrong hostnames (leading to domain hijacking) or injection into applications (leading to remote code execution, XSS, applications crashes, etc.). In other words, a validation step, which is expected in any stub resolver, does not occur.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Uclibc Uclibc | <=0.9.33.2 | |
Uclibc-ng Project Uclibc-ng | <1.0.39 | |
<=0.9.33.2 | ||
<1.0.39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43523 has been classified as a medium severity vulnerability.
To fix CVE-2021-43523, you should upgrade uClibc and uClibc-ng to versions that are 1.0.39 or later.
The risks associated with CVE-2021-43523 include domain hijacking and potential remote code execution due to incorrect handling of domain names.
CVE-2021-43523 affects uClibc versions up to and including 0.9.33.2 and uClibc-ng versions 1.0.39 and earlier.
CVE-2021-43523 impacts the functions gethostbyname, getaddrinfo, gethostbyaddr, and getnameinfo in uClibc and uClibc-ng.