A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1988342 | issue tracking third party advisory |
https://c-ares.haxx.se/adv_20210810.html | exploit patch vendor advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | third party advisory patch |
https://www.oracle.com/security-alerts/cpujul2022.html | third party advisory |
https://security.gentoo.org/glsa/202401-02 | vendor advisory |