Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTlqY3gtcHIyZi1xdnE1
miekg/dns parsing error leads to nil pointer dereference and DoS
An issue was discovered in setTA
in scan_rr.go
in the Miek Gieben DNS library before 1.0.10 for Go. A dns.ParseZone()
parsing error causes a segmentation violation, leading to denial of service.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTlqY3gtcHIyZi1xdnE1
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 3 years ago
Updated: 6 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-9jcx-pr2f-qvq5, CVE-2018-17419
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-17419
- https://github.com/miekg/dns/issues/742
- https://github.com/miekg/dns/commit/501e858f679edecd4a38a86317ce50271014a80d
- https://pkg.go.dev/vuln/GO-2020-0028
- https://github.com/miekg/dns/pull/745/commits/f71d7d9d77d439b30a5e50900df5b1f988a50e5e
- https://github.com/advisories/GHSA-9jcx-pr2f-qvq5
Blast Radius: 36.7
Affected Packages
go:github.com/miekg/dns
Dependent packages: 15,818Dependent repositories: 78,390
Downloads:
Affected Version Ranges: < 1.0.10
Fixed in: 1.0.10
All affected versions: 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7, 1.0.8, 1.0.9
All unaffected versions: 1.0.10, 1.0.11, 1.0.12, 1.0.13, 1.0.14, 1.0.15, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5, 1.1.6, 1.1.7, 1.1.8, 1.1.9, 1.1.10, 1.1.11, 1.1.12, 1.1.13, 1.1.14, 1.1.15, 1.1.16, 1.1.17, 1.1.18, 1.1.19, 1.1.20, 1.1.21, 1.1.22, 1.1.23, 1.1.24, 1.1.25, 1.1.26, 1.1.27, 1.1.28, 1.1.29, 1.1.30, 1.1.31, 1.1.32, 1.1.33, 1.1.34, 1.1.35, 1.1.36, 1.1.37, 1.1.38, 1.1.39, 1.1.40, 1.1.41, 1.1.42, 1.1.43, 1.1.44, 1.1.45, 1.1.46, 1.1.47, 1.1.48, 1.1.49, 1.1.50, 1.1.51, 1.1.52, 1.1.53, 1.1.54, 1.1.55, 1.1.56, 1.1.57, 1.1.58, 1.1.59, 1.1.60, 1.1.61, 1.1.62