CVE-2017-1000381
07.07.2017, 17:29
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.Enginsight
Vendor | Product | Version |
---|---|---|
c-ares | c-ares | 1.8.0 |
c-ares | c-ares | 1.9.0 |
c-ares | c-ares | 1.9.1 |
c-ares | c-ares | 1.10.0 |
c-ares | c-ares | 1.12.0 |
c-ares_project | c-ares | 1.11.0 |
c-ares_project | c-ares | 1.11.0:rc1 |
nodejs | node.js | 4.0.0 ≤ 𝑥 ≤ 4.1.2 |
nodejs | node.js | 4.2.0 ≤ 𝑥 < 4.8.4 |
nodejs | node.js | 5.0.0 ≤ 𝑥 ≤ 5.12.0 |
nodejs | node.js | 6.0.0 ≤ 𝑥 ≤ 6.8.1 |
nodejs | node.js | 6.9.0 ≤ 𝑥 < 6.11.1 |
nodejs | node.js | 7.0.0 ≤ 𝑥 < 7.10.1 |
nodejs | node.js | 8.0.0 ≤ 𝑥 < 8.1.4 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
c-ares |
| ||||||||||||||||||||||||||
nodejs |
|
Common Weakness Enumeration