Description
A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2738-1 | c-ares security update |
Debian DSA |
DSA-4954-1 | c-ares security update |
Ubuntu USN |
USN-5034-1 | c-ares vulnerability |
Ubuntu USN |
USN-5034-2 | c-ares vulnerability |
References
History
Tue, 15 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
C-ares Project
Subscribe
C-ares
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Nodejs
Subscribe
Node.js
Subscribe
Pgbouncer
Subscribe
Pgbouncer
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Computer Node
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux For Ibm Z Systems
Subscribe
Enterprise Linux For Ibm Z Systems Eus
Subscribe
Enterprise Linux For Power Little Endian
Subscribe
Enterprise Linux For Power Little Endian Eus
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Server Update Services For Sap Solutions
Subscribe
Enterprise Linux Tus
Subscribe
Enterprise Linux Workstation
Subscribe
Rhel Eus
Subscribe
Rhel Software Collections
Subscribe
Siemens
Subscribe
Sinec Infrastructure Network Services
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-10-15T17:14:27.220Z
Reserved: 2021-07-30T00:00:00.000Z
Link: CVE-2021-3672
Updated: 2024-08-03T17:01:07.975Z
Status : Modified
Published: 2021-11-23T19:15:07.877
Modified: 2024-11-21T06:22:07.650
Link: CVE-2021-3672
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
Ubuntu USN