DNS DoS sur NodeJS
Vulnerability details
A vulnerability in the C-Ares composant of nodeJS allow an attacker to cause a DoS attack by asking for the resolution of a domain where the list of server is too big.
Impacted products
Revisions
Version |
Date |
Description |
v1 |
20/01/2021 |
Initial release |
v2 |
21/01/2021 |
Correction of the excerpt section and CVE number |
v3 |
28/01/2021 |
Review impacted version |
Stormshield Management Center |
CVSS v2 Overall Score: 1.3
|
Analysis
|
Impacted version
|
On SMC this can only happened when a user try to resolv an FQDN object.
|
|
Workaround solution
|
Solution
|
There is no workaround solution.
|
The 2.8.1 update will fix this vulnerability.
|
Access vector |
Access complexity |
Authentication |
Confidentiality impact |
Integrity impact |
Availability impact |
Network |
High |
None |
None |
None |
Partial |
Exploitability |
Remediation Level |
Report Confidence |
Unproven that exploit exists |
Official fix |
Unconfirmed |
Collateral Damage Potential |
Target Distribution |
None |
Medium [26-75%] |