c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
C-ares
C-ares c-ares |
|
CPEs | cpe:2.3:a:c-ares:c-ares:*:*:*:*:*:*:*:* | |
Vendors & Products |
C-ares
C-ares c-ares |
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T16:50:20.105Z
Reserved: 2023-05-01T16:47:35.314Z
Link: CVE-2023-32067

Updated: 2024-08-02T15:03:28.668Z

Status : Modified
Published: 2023-05-25T23:15:09.380
Modified: 2024-11-21T08:02:38.797
Link: CVE-2023-32067
