ghc-automation-staging-parallel-4-p1 / 3164354_104

0 stars 0 forks source link

github.com/miekg/dns-v1.0.14: 1 vulnerabilities (highest severity is: 5.9) - autoclosed #3

Closed staging-whitesource-for-github-com[bot] closed 3 hours ago

staging-whitesource-for-github-com[bot] commented 3 hours ago
Vulnerable Library - github.com/miekg/dns-v1.0.14

DNS library in Go

Path to dependency file: /go.mod

Path to vulnerable library: /go.mod

Found in HEAD commit: 93c5a584157982bb09e28e884c0bee32ff6349cc

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (github.com/miekg/dns-v1.0.14 version) Remediation Possible**
CVE-2019-19794 Medium 5.9 github.com/miekg/dns-v1.0.14 Direct v1.1.25

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2019-19794 ### Vulnerable Library - github.com/miekg/dns-v1.0.14

DNS library in Go

Path to dependency file: /go.mod

Path to vulnerable library: /go.mod

Dependency Hierarchy: - :x: **github.com/miekg/dns-v1.0.14** (Vulnerable Library)

Found in HEAD commit: 93c5a584157982bb09e28e884c0bee32ff6349cc

Found in base branch: main

### Vulnerability Details

The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.

Publish Date: 2019-12-13

URL: CVE-2019-19794

### CVSS 3 Score Details (5.9)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19794

Release Date: 2020-01-02

Fix Resolution: v1.1.25

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.

:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.

staging-whitesource-for-github-com[bot] commented 3 hours ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.