Open mend-bolt-for-github[bot] opened 1 year ago
Executes Nodejs via GRPC from Golang client.
Library home page: https://github.com/arijitAD/Golang_Node_Executor.git
Found in base branch: master
/trustid-sdk/node_modules/grpc/deps/grpc/third_party/cares/cares/ares_parse_soa_reply.c /trustid-sdk/node_modules/grpc/deps/grpc/third_party/cares/cares/ares_parse_soa_reply.c
Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c.
Publish Date: 2023-08-22
URL: CVE-2020-22217
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
Type: Upgrade version
Release Date: 2023-08-22
Fix Resolution: NO_fIX
Step up your Open Source Security Game with Mend here
CVE-2020-22217 - Medium Severity Vulnerability
Vulnerable Library - Golang_Node_Executorv1.0
Executes Nodejs via GRPC from Golang client.
Library home page: https://github.com/arijitAD/Golang_Node_Executor.git
Found in base branch: master
Vulnerable Source Files (2)
/trustid-sdk/node_modules/grpc/deps/grpc/third_party/cares/cares/ares_parse_soa_reply.c /trustid-sdk/node_modules/grpc/deps/grpc/third_party/cares/cares/ares_parse_soa_reply.c
Vulnerability Details
Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c.
Publish Date: 2023-08-22
URL: CVE-2020-22217
CVSS 3 Score Details (5.9)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2023-08-22
Fix Resolution: NO_fIX
Step up your Open Source Security Game with Mend here