Description
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-4638-1 | c-ares vulnerability |
References
History
No history.
Subscriptions
C-ares Project
Subscribe
C-ares
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Nodejs
Subscribe
Node.js
Subscribe
Oracle
Subscribe
Blockchain Platform
Subscribe
Graalvm
Subscribe
Jd Edwards Enterpriseone Tools
Subscribe
Mysql Cluster
Subscribe
Retail Xstore Point Of Service
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Rhel Software Collections
Subscribe
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2025-04-30T22:24:27.745Z
Reserved: 2020-01-28T00:00:00.000Z
Link: CVE-2020-8277
No data.
Status : Modified
Published: 2020-11-19T01:15:12.763
Modified: 2024-11-21T05:38:38.383
Link: CVE-2020-8277
OpenCVE Enrichment
No data.
Ubuntu USN