Exploit Report

Computer Security And Bug Information

CVE-2023-31130

CVECVE-2023-31130
CVE Title
Published Date2023-05-25T22:15Z
Modified Date2023-05-28T06:15Z
Descriptionc-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1.
References
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites.
Reference URLhttps://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
Reference DescriptionMISC https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
Reference URLhttps://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v
Reference DescriptionMISC https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v
Reference URLhttps://lists.fedoraproject.org/archives/list/[email protected]/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
Reference DescriptionMISC https://lists.fedoraproject.org/archives/list/[email protected]/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
Reference URLhttps://lists.fedoraproject.org/archives/list/[email protected]/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
Reference DescriptionMISC https://lists.fedoraproject.org/archives/list/[email protected]/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
Sources NIST MITRE
Note
  • No CVSS data for this CVE

This site's data is aggregated programmatically and provided "as is" without any representations or warranties, express or implied. Exploit.report is not affiliated with the The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation

© 2022 Exploit.Report | Data | Contact | Privacy Policy | Articles