Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.854078
Category:SuSE Local Security Checks
Title:openSUSE: Security Advisory for c-ares (openSUSE-SU-2021:1168-1)
Summary:The remote host is missing an update for the 'c-ares'; package(s) announced via the openSUSE-SU-2021:1168-1 advisory.
Description:Summary:
The remote host is missing an update for the 'c-ares'
package(s) announced via the openSUSE-SU-2021:1168-1 advisory.

Vulnerability Insight:
This update for c-ares fixes the following issues:

Version update to git snapshot 1.17.1+20200724:

- CVE-2021-3672: fixed missing input validation on hostnames returned by
DNS servers (bsc#1188881)

- If ares_getaddrinfo() was terminated by an ares_destroy(), it would
cause crash

- Crash in sortaddrinfo() if the list size equals 0 due to an unexpected
DNS response

- Expand number of escaped characters in DNS replies as per RFC1035 5.1 to
prevent spoofing

- Use unbuffered /dev/urandom for random data to prevent early startup
performance issues

This update was imported from the SUSE:SLE-15:Update update project.

Affected Software/OS:
'c-ares' package(s) on openSUSE Leap 15.2.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-3672
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://security.gentoo.org/glsa/202401-02
https://bugzilla.redhat.com/show_bug.cgi?id=1988342
https://c-ares.haxx.se/adv_20210810.html
https://www.oracle.com/security-alerts/cpujul2022.html
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.