Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-31130
HistoryMay 25, 2023 - 12:00 a.m.

CVE-2023-31130

2023-05-2500:00:00
ubuntu.com
ubuntu.com
14
c-ares
resolver library
buffer underflow
ipv6
configuration
administrator
vulnerability
severe issues
update
unix

6.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

c-ares is an asynchronous resolver library. ares_inet_net_pton() is
vulnerable to a buffer underflow for certain ipv6 addresses, in particular
“0::00:00:00/2” was found to cause an issue. C-ares only uses this function
internally for configuration purposes which would require an administrator
to configure such an address via ares_set_sortlist(). However, users may
externally use ares_inet_net_pton() for other purposes and thus be
vulnerable to more severe issues. This issue has been fixed in 1.19.1.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchc-ares< 1.14.0-1ubuntu0.2+esm1UNKNOWN
ubuntu20.04noarchc-ares< 1.15.0-1ubuntu0.3UNKNOWN
ubuntu22.04noarchc-ares< 1.18.1-1ubuntu0.22.04.2UNKNOWN
ubuntu22.10noarchc-ares< 1.18.1-1ubuntu0.22.10.2UNKNOWN
ubuntu23.04noarchc-ares< 1.18.1-2ubuntu0.1UNKNOWN
ubuntu16.04noarchc-ares< 1.10.0-3ubuntu0.2+esm2UNKNOWN

6.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%