Remote Memory Exposure Affecting dns-packet package, versions <1.3.4 >=2.0.0 <5.2.4


0.0
high

Snyk CVSS

    Attack Complexity High
    Scope Changed
    Confidentiality High

    Threat Intelligence

    EPSS 0.1% (40th percentile)
Expand this section
NVD
6.5 medium
Expand this section
Red Hat
6.3 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JS-DNSPACKET-1293563
  • published 20 May 2021
  • disclosed 18 May 2021
  • credit chalker

How to fix?

Upgrade dns-packet to version 1.3.4, 5.2.4 or higher.

Overview

dns-packet is an An abstract-encoding compliant module for encoding / decoding DNS packets

Affected versions of this package are vulnerable to Remote Memory Exposure. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.