Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-4904

Опубликовано: 13 дек. 2022
Источник: redhat
CVSS3: 8.6
EPSS Низкий

Описание

A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.

Отчет

The severity of this vulnerability is not important but moderate because exploiting the vulnerability can lead to a disruption of the availability of an application, yet doesn’t compromise data integrity or confidentiality. The opportunity for disruption is further limited due to the requirement that an application allows an attacker to be able to input both untrusted and unvalidated data. Exploiting this flaw requires an application to use the library in such a way that would allow untrusted and unvalidated input to be passed directly to ares_set_sortlist by an attacker. In the event that this is able to occur, the impact to RHEL is limited to a crash of the application due to the protections offered by default in RHEL systems such as Stack Smashing Protection (SSP).

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6c-aresOut of support scope
Red Hat Enterprise Linux 7c-aresWill not fix
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:158204.04.2023
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:174312.04.2023
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:403512.07.2023
Red Hat Enterprise Linux 8c-aresFixedRHSA-2023:711614.11.2023
Red Hat Enterprise Linux 8.4 Extended Update SupportnodejsFixedRHSA-2023:153330.03.2023
Red Hat Enterprise Linux 8.6 Extended Update SupportnodejsFixedRHSA-2023:174212.04.2023
Red Hat Enterprise Linux 8.8 Extended Update Supportc-aresFixedRHSA-2023:754328.11.2023
Red Hat Enterprise Linux 9nodejsFixedRHSA-2023:265409.05.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20->CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=2168631c-ares: buffer overflow in config_sortlist() due to missing string length check

EPSS

Процентиль: 35%
0.00138
Низкий

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
ubuntu
больше 2 лет назад

A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.

CVSS3: 8.6
nvd
больше 2 лет назад

A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.

CVSS3: 8.6
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 8.6
debian
больше 2 лет назад

A flaw was found in the c-ares package. The ares_set_sortlist is missi ...

suse-cvrf
почти 2 года назад

Security update for libcares2

EPSS

Процентиль: 35%
0.00138
Низкий

8.6 High

CVSS3