Remote Memory Exposure Affecting dns-packet package, versions <1.3.4>=2.0.0 <5.2.4


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.1% (43rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-DNSPACKET-1293563
  • published20 May 2021
  • disclosed18 May 2021
  • creditchalker

Introduced: 18 May 2021

CVE-2021-23386  (opens in a new tab)
CWE-201  (opens in a new tab)
First added by Snyk

How to fix?

Upgrade dns-packet to version 1.3.4, 5.2.4 or higher.

Overview

dns-packet is an An abstract-encoding compliant module for encoding / decoding DNS packets

Affected versions of this package are vulnerable to Remote Memory Exposure. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.

CVSS Scores

version 3.1