Description
Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final and 4.1.133.Final, Netty's DNS codec does not enforce RFC 1035 domain name constraints during either encoding or decoding. This creates a bidirectional attack surface: malicious DNS responses can exploit the decoder, and user-influenced hostnames can exploit the encoder. This vulnerability is fixed in 4.2.13.Final and 4.1.133.Final.
Problem types
CWE-20: Improper Input Validation
CWE-400: Uncontrolled Resource Consumption
CWE-626: Null Byte Interaction Error (Poison Null Byte)
Product status
< 4.1.133.Final
References
github.com/.../netty/security/advisories/GHSA-cm33-6792-r9fm
github.com/.../netty/security/advisories/GHSA-cm33-6792-r9fm