Vulnerability Description
A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| C-Ares Project | C-Ares | >= 1.0.0, < 1.17.2 |
| Fedoraproject | Fedora | 33 |
| Redhat | Enterprise Linux | 7.0 |
| Redhat | Enterprise Linux Computer Node | 1 |
| Redhat | Enterprise Linux Eus | 7.7 |
| Redhat | Enterprise Linux For Ibm Z Systems | 8.0 |
| Redhat | Enterprise Linux For Ibm Z Systems Eus | 8.1 |
| Redhat | Enterprise Linux For Power Little Endian | 8.0 |
| Redhat | Enterprise Linux For Power Little Endian Eus | 8.1 |
| Redhat | Enterprise Linux Server Aus | 8.2 |
| Redhat | Enterprise Linux Server Tus | 8.2 |
| Redhat | Enterprise Linux Server Update Services For Sap Solutions | 8.1 |
| Redhat | Enterprise Linux Tus | 8.4 |
| Redhat | Enterprise Linux Workstation | 1 |
| Siemens | Sinec Infrastructure Network Services | < 1.0.1.1 |
| Nodejs | Node.Js | >= 12.0.0, <= 12.12.0 |
| Pgbouncer | Pgbouncer | <= 1.17.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1988342Issue TrackingThird Party Advisory
- https://c-ares.haxx.se/adv_20210810.htmlExploitPatchVendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdfPatchThird Party Advisory
- https://security.gentoo.org/glsa/202401-02
- https://www.oracle.com/security-alerts/cpujul2022.htmlThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1988342Issue TrackingThird Party Advisory
- https://c-ares.haxx.se/adv_20210810.htmlExploitPatchVendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdfPatchThird Party Advisory
- https://security.gentoo.org/glsa/202401-02
- https://www.oracle.com/security-alerts/cpujul2022.htmlThird Party Advisory
FAQ
What is CVE-2021-3672?
CVE-2021-3672 is a vulnerability with a CVSS score of 5.6 (MEDIUM). A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Dom...
How severe is CVE-2021-3672?
CVE-2021-3672 has been rated MEDIUM with a CVSS base score of 5.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-3672?
Check the references section above for vendor advisories and patch information. Affected products include: C-Ares Project C-Ares, Fedoraproject Fedora, Redhat Enterprise Linux, Redhat Enterprise Linux Computer Node, Redhat Enterprise Linux Eus.