Your submission was sent successfully! Close

CVE-2021-3672

Published: 10 August 2021

A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.

Priority

Medium

CVSS 3 base score: 7.3

Status

Package Release Status
c-ares
Launchpad, Ubuntu, Debian
Upstream
Released (1.17.2)
Ubuntu 21.10 (Impish Indri)
Released (1.17.1-1ubuntu1)
Ubuntu 21.04 (Hirsute Hippo)
Released (1.17.1-1ubuntu0.1)
Ubuntu 20.04 LTS (Focal Fossa)
Released (1.15.0-1ubuntu0.1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (1.14.0-1ubuntu0.1)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (1.10.0-3ubuntu0.2+esm1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Patches:
Upstream: https://github.com/c-ares/c-ares/commit/362f91d
Upstream: https://github.com/c-ares/c-ares/commit/44c009b