ghc-automation-staging-parallel-4-p1 / 3164354_415

0 stars 0 forks source link

CVE-2019-19794 (Medium) detected in github.com/miekg/dns-v1.0.14 - autoclosed #3

Closed staging-whitesource-for-github-com[bot] closed 5 days ago

staging-whitesource-for-github-com[bot] commented 5 days ago

CVE-2019-19794 - Medium Severity Vulnerability

Vulnerable Library - github.com/miekg/dns-v1.0.14

DNS library in Go

Path to dependency file: /go.mod

Path to vulnerable library: /go.mod

Dependency Hierarchy: - :x: **github.com/miekg/dns-v1.0.14** (Vulnerable Library)

Found in HEAD commit: 139f3512a79e3e9ef2a72d6e26b4e1a7c743ca3b

Found in base branch: main

Vulnerability Details

The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.

Publish Date: 2019-12-13

URL: CVE-2019-19794

CVSS 3 Score Details (5.9)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19794

Release Date: 2020-01-02

Fix Resolution: v1.1.25


:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.

staging-whitesource-for-github-com[bot] commented 5 days ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.