c-ares vulnerability
Vulnerability details
Missing input validation of host names returned by Domain Name Servers in the c-ares library can lead to output of wrong hostnames (leading to Domain Hijacking).
Impacted products
Revisions
Version |
Date |
Description |
v1 |
10/06/2021 |
Initial release |
v2 |
12/08/2021 |
Updating information |
Stormshield Network Security |
CVSS v3.1 Overall Score: 3.3
|
Analysis
|
Impacted version
|
SNS could be impacted if an attacker inject bad domain name in a DNS request, this can potentially lead to DNS-cache injections.
|
SNS 4.0.0 to 4.2.4
|
Workaround solution
|
Solution
|
There is no workaround solution.
|
The vulnerability is fixed in version 4.2.5
|
Attack Vector |
Attack Complexity |
Privileges Required |
User Interaction |
Scope |
Confidentiality Impact |
Integrity Impact |
Availability impact |
Adjacent Network |
High |
None |
None |
Unchanged |
Low |
None |
Low |
Exploit Code Maturity |
Remediation Level |
Report Confidence |
Proof of concept code |
Official fix |
Confirmed |
Confidentiality Requirement |
Integrity Requirement |
Availability Requirement |
Medium |
Low |
Low |