Name | CVE-2021-3672 |
Description | A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2738-1, DSA-4954-1, ELA-474-1 |
Debian Bugs | 992053 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
c-ares (PTS) | jessie, jessie (lts) | 1.10.0-2+deb8u7 | fixed |
stretch (security) | 1.12.0-1+deb9u2 | fixed | |
stretch (lts), stretch | 1.12.0-1+deb9u6 | fixed | |
buster (security), buster, buster (lts) | 1.14.0-1+deb10u4 | fixed | |
bullseye (security), bullseye | 1.17.1-1+deb11u3 | fixed | |
bookworm | 1.18.1-3 | fixed | |
sid, trixie | 1.34.2-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
c-ares | source | jessie | 1.10.0-2+deb8u3 | ELA-474-1 | ||
c-ares | source | stretch | 1.12.0-1+deb9u2 | DLA-2738-1 | ||
c-ares | source | buster | 1.14.0-1+deb10u1 | DSA-4954-1 | ||
c-ares | source | bullseye | 1.17.1-1+deb11u1 | |||
c-ares | source | (unstable) | 1.17.1-1.1 | 992053 |
https://c-ares.haxx.se/adv_20210810.html
https://github.com/c-ares/c-ares/commit/362f91d807d293791008cdb7616d40f7784ece83
https://github.com/c-ares/c-ares/commit/44c009b8e62ea1929de68e3f438181bea469ec14