Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2023-32067
HistoryMay 25, 2023 - 10:49 p.m.

CVE-2023-32067 0-byte UDP payload DoS in c-ares

2023-05-2522:49:55
CWE-400
GitHub_M
github.com
5
c-ares
udp payload
denial of service
vulnerability
version 1.19.1

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

48.7%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
    ],
    "vendor": "fedoraproject",
    "product": "fedora",
    "versions": [
      {
        "status": "affected",
        "version": "37"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:c-ares:c-ares:*:*:*:*:*:*:*:*"
    ],
    "vendor": "c-ares",
    "product": "c-ares",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "1.19.1",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
    ],
    "vendor": "fedoraproject",
    "product": "fedora",
    "versions": [
      {
        "status": "affected",
        "version": "38"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
      "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
    ],
    "vendor": "debian",
    "product": "debian_linux",
    "versions": [
      {
        "status": "affected",
        "version": "10.0"
      },
      {
        "status": "affected",
        "version": "11.0"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

48.7%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial