c-ares 1.9.1

CPE Details

c-ares 1.9.1
1.9.1
2023-09-15
09h42 +00:00
2023-09-15
09h42 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:c-ares:c-ares:1.9.1:*:*:*:*:*:*:*

Informations

Vendor

c-ares

Product

c-ares

Version

1.9.1

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-25629 2024-02-23 14h52 +00:00 c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist.
5.5
Moyen
CVE-2017-1000381 2017-07-07 15h00 +00:00 The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
7.5
Haute
CVE-2016-5180 2016-10-03 13h00 +00:00 Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot.
9.8
Critique