Name | CVE-2020-8277 |
Description | A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
c-ares (PTS) | jessie, jessie (lts) | 1.10.0-2+deb8u7 | fixed |
| stretch (security) | 1.12.0-1+deb9u2 | fixed |
| stretch (lts), stretch | 1.12.0-1+deb9u6 | fixed |
| buster (security), buster, buster (lts) | 1.14.0-1+deb10u4 | fixed |
| bullseye (security), bullseye | 1.17.1-1+deb11u3 | fixed |
| bookworm | 1.18.1-3 | fixed |
| sid, trixie | 1.34.2-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
c-ares | source | jessie | (not affected) | | | |
c-ares | source | stretch | (not affected) | | | |
c-ares | source | buster | (not affected) | | | |
c-ares | source | (unstable) | 1.17.1-1 | | | |
Notes
[buster] - c-ares <not-affected> (Introduced in 1.16)
[stretch] - c-ares <not-affected> (Introduced in 1.16)
Originally reported for nodes, which bundles c-ares: https://nodejs.org/en/blog/vulnerability/november-2020-security-releases/#denial-of-service-through-dns-request-cve-2020-8277
Fix in c-ares: https://github.com/c-ares/c-ares/commit/0d252eb3b2147179296a3bdb4ef97883c97c54d3
Introduced in https://github.com/c-ares/c-ares/commit/7d3591ee8a1a63e7748e68e6d880bd1763a32885
[jessie] - c-ares <not-affected> (Introduced in 1.16)