CVE-2021-43523

Publication date 10 November 2021

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

9.6 · Critical

Score breakdown

In uClibc and uClibc-ng before 1.0.39, incorrect handling of special characters in domain names returned by DNS servers via gethostbyname, getaddrinfo, gethostbyaddr, and getnameinfo can lead to output of wrong hostnames (leading to domain hijacking) or injection into applications (leading to remote code execution, XSS, applications crashes, etc.). In other words, a validation step, which is expected in any stub resolver, does not occur.

Status

Package Ubuntu Release Status
uclibc 16.04 LTS xenial Ignored end of standard support
14.04 LTS trusty Ignored end of standard support
uclibc-ng 16.04 LTS xenial Ignored end of standard support
14.04 LTS trusty Ignored end of standard support

Severity score breakdown

Parameter Value
Base score 9.6 · Critical
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Changed
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H