GHSA-3wcq-x3mq-6r9p

Suggest an improvement
Source
https://github.com/advisories/GHSA-3wcq-x3mq-6r9p
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-3wcq-x3mq-6r9p/GHSA-3wcq-x3mq-6r9p.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-3wcq-x3mq-6r9p
Aliases
Published
2021-05-24T19:51:04Z
Modified
2025-01-08T10:41:55.398442Z
Severity
  • 7.7 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L CVSS Calculator
Summary
Potential memory exposure in dns-packet
Details

This affects the package dns-packet before versions 1.3.2 and 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.

Database specific
{
    "nvd_published_at": "2021-05-20T17:15:00Z",
    "cwe_ids": [
        "CWE-200",
        "CWE-908"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2021-05-21T18:07:04Z"
}
References

Affected packages

npm / dns-packet

Package

Affected ranges

Type
SEMVER
Events
Introduced
2.0.0
Fixed
5.2.2

Ecosystem specific

{
    "affected_functions": [
        "(dns-packet).encodingLength"
    ]
}

npm / dns-packet

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.2

Ecosystem specific

{
    "affected_functions": [
        "(dns-packet).encodingLength"
    ]
}