Lucene search

K
archlinuxArchLinuxASA-201707-21
HistoryJul 18, 2017 - 12:00 a.m.

[ASA-201707-21] c-ares: information disclosure

2017-07-1800:00:00
security.archlinux.org
13

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

60.9%

Arch Linux Security Advisory ASA-201707-21

Severity: Medium
Date : 2017-07-18
CVE-ID : CVE-2017-1000381
Package : c-ares
Type : information disclosure
Remote : Yes
Link : https://security.archlinux.org/AVG-315

Summary

The package c-ares before version 1.13.0-1 is vulnerable to information
disclosure.

Resolution

Upgrade to 1.13.0-1.

pacman -Syu “c-ares>=1.13.0-1”

The problem has been fixed upstream in version 1.13.0.

Workaround

None.

Description

A out-of-bounds read has been found in c-ares < 1.13.0. The
ares_parse_naptr_reply() function, which is used for parsing NAPTR
responses, could be triggered to read memory outside of the given input
buffer if the passed in DNS response packet was crafted in a particular
way.

Impact

A remote attacker might be able to access sensitive information by
responding to a DNS query with a crafted response packet.

References

https://c-ares.haxx.se/adv_20170620.html
https://security.archlinux.org/CVE-2017-1000381

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyc-ares< 1.13.0-1UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

60.9%