CVE-2020-8277

NameCVE-2020-8277
DescriptionA Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
c-ares (PTS)jessie, jessie (lts)1.10.0-2+deb8u7fixed
stretch (security)1.12.0-1+deb9u2fixed
stretch (lts), stretch1.12.0-1+deb9u6fixed
buster (security), buster, buster (lts)1.14.0-1+deb10u4fixed
bullseye (security), bullseye1.17.1-1+deb11u3fixed
bookworm1.18.1-3fixed
sid, trixie1.34.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
c-aressourcejessie(not affected)
c-aressourcestretch(not affected)
c-aressourcebuster(not affected)
c-aressource(unstable)1.17.1-1

Notes

[buster] - c-ares <not-affected> (Introduced in 1.16)
[stretch] - c-ares <not-affected> (Introduced in 1.16)
Originally reported for nodes, which bundles c-ares: https://nodejs.org/en/blog/vulnerability/november-2020-security-releases/#denial-of-service-through-dns-request-cve-2020-8277
Fix in c-ares: https://github.com/c-ares/c-ares/commit/0d252eb3b2147179296a3bdb4ef97883c97c54d3
Introduced in https://github.com/c-ares/c-ares/commit/7d3591ee8a1a63e7748e68e6d880bd1763a32885
[jessie] - c-ares <not-affected> (Introduced in 1.16)

Search for package or bug name: Reporting problems