Lucene search

K
amazonAmazonALAS-2023-1780
HistoryJul 05, 2023 - 9:44 p.m.

Medium: c-ares

2023-07-0521:44:00
alas.aws.amazon.com
11
c-ares
stack overflow
cve-2022-4904
denial of service
confidentiality
integrity
update
red hat
mitre
unix

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

0.001 Low

EPSS

Percentile

26.2%

Issue Overview:

A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity. (CVE-2022-4904)

Affected Packages:

c-ares

Issue Correction:
Run yum update c-ares to update your system.

New Packages:

i686:  
    c-ares-debuginfo-1.17.2-1.10.amzn1.i686  
    c-ares-1.17.2-1.10.amzn1.i686  
    c-ares-devel-1.17.2-1.10.amzn1.i686  
  
src:  
    c-ares-1.17.2-1.10.amzn1.src  
  
x86_64:  
    c-ares-1.17.2-1.10.amzn1.x86_64  
    c-ares-debuginfo-1.17.2-1.10.amzn1.x86_64  
    c-ares-devel-1.17.2-1.10.amzn1.x86_64  

Additional References

Red Hat: CVE-2022-4904

Mitre: CVE-2022-4904

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

0.001 Low

EPSS

Percentile

26.2%