c-ares 1.16.0

CPE Details

c-ares 1.16.0
1.16.0
2023-09-15
09h42 +00:00
2023-09-15
09h42 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:c-ares:c-ares:1.16.0:*:*:*:*:*:*:*

Informations

Vendor

c-ares

Product

c-ares

Version

1.16.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-25629 2024-02-23 14h52 +00:00 c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist.
5.5
Medium
CVE-2020-14354 2021-05-13 11h38 +00:00 A possible use-after-free and double-free in c-ares lib version 1.16.0 if ares_destroy() is called prior to ares_getaddrinfo() completing. This flaw possibly allows an attacker to crash the service that uses c-ares lib. The highest threat from this vulnerability is to this service availability.
3.3
Low