c-ares vulnerabilities
This is all known and public c-ares vulnerabilities to date. See also our security incident process.
CVE-2024-25629 - Feb 23 2024
Moderate. Reading malformatted /etc/resolv.conf
, /etc/nsswitch.conf
or the HOSTALIASES
file could result in a
crash. Fixed in 1.27.0. CVE-2024-25629
CVE-2023-32067 - May 22 2023
High. 0-byte UDP payload causes Denial of Service. Fixed in 1.19.1. CVE-2023-32067
CVE-2023-31147 - May 22 2023
Moderate. Insufficient randomness in generation of DNS query IDs. Fixed in 1.19.1. CVE-2023-31147
CVE-2023-31130 - May 22 2023
Moderate. Buffer Underwrite in ares_inet_net_pton(). Fixed in 1.19.1. CVE-2023-31130
CVE-2023-31124 - May 22 2023
Low. AutoTools does not set CARES_RANDOM_FILE during cross compilation. Fixed in 1.19.1. CVE-2023-31124
CVE-2022-4904 - Feb 17 2023
The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity. Fixed in 1.19.0. CVE-2022-4904
CVE-2021-3672 - August 10 2021
Missing input validation on hostnames returned by DNS servers
CVE-2017-1000381 - June 20 2017
NAPTR parser out of bounds access
CVE-2016-5180 - Sep 29 2016
ares_create_query single byte out of buffer write
CVE-2007-3153 - Jun 8 2007
The ares_init:randomize_key function uses the rand command to produce random numbers. A remote attacker could exploit this vulnerability to possibly spoof hostnames and addresses in the DNS cache. project advisory.
For unknown reasons, it seems CVE-2007-3152 is also often used to refer to this same issue.
This flaw was fixed in 1.4.0.