Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-31147
HistoryMay 25, 2023 - 12:00 a.m.

CVE-2023-31147

2023-05-2500:00:00
ubuntu.com
ubuntu.com
104
c-ares
resolver library
weak rng
predictable output
non-compliant
rc4
ubuntu
urandom
dns
query id

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

42.1%

c-ares is an asynchronous resolver library. When /dev/urandom or
RtlGenRandom() are unavailable, c-ares uses rand() to generate random
numbers used for DNS query ids. This is not a CSPRNG, and it is also not
seeded by srand() so will generate predictable output. Input from the
random number generator is fed into a non-compilant RC4 implementation and
may not be as strong as the original RC4 implementation. No attempt is made
to look for modern OS-provided CSPRNGs like arc4random() that is widely
available. This issue has been fixed in version 1.19.1.

Notes

Author Note
mdeslaur urandom is always available on Ubuntu and is detected during build

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

42.1%