[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

[3.4] c-ares: Single byte out of buffer write (CVE-2016-5180)

ID: oval:org.secpod.oval:def:1800793Date: (C)2018-03-29   (M)2023-11-10
Class: PATCHFamily: unix




When a string is passed in to ares_create_query or ares_mkquery and uses an escaped trailing dot, like "hello\.", c-ares calculates the string length wrong and subsequently writes outside of the allocated buffer with one byte. The wrongly written byte is the least significant byte of the "dnsclass" argument; most commonly 1.Proof of concept code have showed how this can be exploited in a real-world system, but we are not aware of any exploits having actually happened in the wild. Affected versions: c-ares 1.0.0 to and including 1.11.0 Fixed In Version: c-ares 1.12.0.

Platform:
Alpine Linux 3.4
Product:
c-ares
Reference:
6257
CVE-2016-5180
CVE    1
CVE-2016-5180
CPE    26
cpe:/a:c-ares_project:c-ares:1.7.5
cpe:/a:c-ares_project:c-ares:1.7.4
cpe:/a:c-ares_project:c-ares:1.10.0
cpe:/a:c-ares_project:c-ares:1.11.0
...

© SecPod Technologies