Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-31130


c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1.


Published

2023-05-25T22:15:09.760

Last Modified

2025-02-13T17:16:26.707

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 4.1 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-124
  • Type: Primary
    CWE-787

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application c-ares_project c-ares < 1.19.1 Yes
Operating System fedoraproject fedora 37 Yes
Operating System fedoraproject fedora 38 Yes
Operating System debian debian_linux 10.0 Yes
Operating System debian debian_linux 11.0 Yes

References