Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2020-22217

Disclosure Date: August 22, 2023 (last updated October 31, 2023)
Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c.
Attacker Value
Unknown

CVE-2020-14354

Disclosure Date: May 13, 2021 (last updated February 22, 2025)
A possible use-after-free and double-free in c-ares lib version 1.16.0 if ares_destroy() is called prior to ares_getaddrinfo() completing. This flaw possibly allows an attacker to crash the service that uses c-ares lib. The highest threat from this vulnerability is to this service availability.
Attacker Value
Unknown

CVE-2017-1000381

Disclosure Date: July 07, 2017 (last updated November 26, 2024)
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
Attacker Value
Unknown

CVE-2016-5180

Disclosure Date: October 03, 2016 (last updated November 08, 2023)
Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot.
Attacker Value
Unknown

CVE-2007-3153

Disclosure Date: June 11, 2007 (last updated October 04, 2023)
The ares_init:randomize_key function in c-ares, on platforms other than Windows, uses a weak facility for producing a random number sequence (Unix rand), which makes it easier for remote attackers to spoof DNS responses by guessing certain values.
0
Attacker Value
Unknown

CVE-2007-3152

Disclosure Date: June 11, 2007 (last updated October 04, 2023)
c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.
0