5
CVSSv2

CVE-2020-8277

Published: 19/11/2020 Updated: 30/11/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A Node.js application that allows an malicious user to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

nodejs node.js

fedoraproject fedora 33

Vendor Advisories

Synopsis Moderate: rh-nodejs12-nodejs security update Type/Severity Security Advisory: Moderate Topic An update for rh-nodejs12-nodejs is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Syst ...
Arch Linux Security Advisory ASA-202011-18 ========================================== Severity: Medium Date : 2020-11-19 CVE-ID : CVE-2020-8277 Package : c-ares Type : denial of service Remote : Yes Link : securityarchlinuxorg/AVG-1280 Summary ======= The package c-ares before version 1171-1 is vulnerable to denial of serv ...
A application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service by getting the application to resolve a DNS record with a larger number of responses ...

Github Repositories

CVE-2020-8277 For educational purposes only Quick Run # clone this repository $ git clone githubcom/masahiro331/CVE-2020-8277 # run bind $ docker build -t bind-local /bind # Need TCP fallback $ docker run --rm --name bind -it -p 53:53 -p 53:53/udp bind # use "&lt; v1521" version # If you use fixed version, build node $ git clone githubcom