6.8

CVE-2021-3672

Exploit

A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
C-ares ProjectC-ares Version >= 1.0.0 < 1.17.2
FedoraprojectFedora Version33
FedoraprojectFedora Version34
RedhatEnterprise Linux Version7.0
RedhatEnterprise Linux Version7.7
RedhatEnterprise Linux Version8.0
RedhatEnterprise Linux Eus Version7.7
RedhatEnterprise Linux Eus Version8.1
RedhatEnterprise Linux Eus Version8.2
RedhatEnterprise Linux Eus Version8.4
RedhatEnterprise Linux Tus Version8.4
NodejsNode.Js SwEdition- Version >= 12.0.0 <= 12.12.0
NodejsNode.Js SwEditionlts Version >= 12.13.0 < 12.22.5
NodejsNode.Js SwEdition- Version >= 14.0.0 <= 14.14.0
NodejsNode.Js SwEditionlts Version >= 14.15.0 < 14.17.5
NodejsNode.Js SwEdition- Version >= 16.0.0 < 16.6.2
PgbouncerPgbouncer Version <= 1.17.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.11% 0.305
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.6 2.2 3.4
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.