Remote Memory Exposure Affecting dns-packet package, versions <1.3.4 >=2.0.0 <5.2.4


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.1% (42nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JS-DNSPACKET-1293563
  • published 20 May 2021
  • disclosed 18 May 2021
  • credit chalker

How to fix?

Upgrade dns-packet to version 1.3.4, 5.2.4 or higher.

Overview

dns-packet is an An abstract-encoding compliant module for encoding / decoding DNS packets

Affected versions of this package are vulnerable to Remote Memory Exposure. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
7.7 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Scope (S)
    Changed
  • Confidentiality (C)
    High
  • Integrity (I)
    Low
  • Availability (A)
    Low
Expand this section

NVD

6.5 medium
Expand this section

Red Hat

6.3 medium