Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-31130

Опубликовано: 22 мая 2023
Источник: redhat
CVSS3: 5.7
EPSS Низкий

Описание

c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1.

A vulnerability was found in c-ares. This issue occurs in the ares_inet_net_pton() function, which is vulnerable to a buffer underflow for certain ipv6 addresses. "0::00:00:00/2" in particular was found to cause an issue. C-ares only uses this function internally for configuration purposes, which would require an administrator to configure such an address via ares_set_sortlist().

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6c-aresOut of support scope
Red Hat Enterprise Linux 7c-aresOut of support scope
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:403412.07.2023
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:403512.07.2023
Red Hat Enterprise Linux 8c-aresFixedRHSA-2023:720714.11.2023
Red Hat Enterprise Linux 8.6 Extended Update SupportnodejsFixedRHSA-2023:403312.07.2023
Red Hat Enterprise Linux 8.6 Extended Update Supportc-aresFixedRHSA-2023:739221.11.2023
Red Hat Enterprise Linux 8.8 Extended Update Supportc-aresFixedRHSA-2023:754328.11.2023
Red Hat Enterprise Linux 9nodejsFixedRHSA-2023:357714.06.2023
Red Hat Enterprise Linux 9nodejsFixedRHSA-2023:358614.06.2023

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2209497c-ares: Buffer Underwrite in ares_inet_net_pton()

EPSS

Процентиль: 1%
0.00011
Низкий

5.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.1
ubuntu
около 2 лет назад

c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1.

CVSS3: 4.1
nvd
около 2 лет назад

c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1.

CVSS3: 6.4
msrc
2 месяца назад

Описание отсутствует

CVSS3: 4.1
debian
около 2 лет назад

c-ares is an asynchronous resolver library. ares_inet_net_pton() is vu ...

CVSS3: 6.4
fstec
около 2 лет назад

Уязвимость функции ares_inet_net_pton() библиотеки асинхронных DNS-запросов C-ares, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 1%
0.00011
Низкий

5.7 Medium

CVSS3