[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-5419-1 c-ares -- c-ares

ID: oval:org.secpod.oval:def:93354Date: (C)2023-09-27   (M)2024-06-13
Class: PATCHFamily: unix




Two vunerabilities were discovered in c-ares, an asynchronous name resolver library: CVE-2023-31130 ares_inet_net_pton is found to be vulnerable to a buffer underflow for certain ipv6 addresses, in particular '0::00:00:00/2' was found to cause an issue. c-ares only uses this function internally for configuration purposes, however external usage for other purposes may cause more severe issues. CVE-2023-32067 Target resolver may erroneously interprets a malformed UDP packet with a lenght of 0 as a graceful shutdown of the connection, which could cause a denial of service.

Platform:
Linux Mint 5
Product:
libc-ares2
libc-ares-dev
Reference:
DSA-5419-1
CVE-2023-31130
CVE-2023-32067
CVE    2
CVE-2023-32067
CVE-2023-31130
CPE    2
cpe:/a:c-ares:libc-ares2
cpe:/o:linux_mint:linux_mint:5

© SecPod Technologies