CVE-2025-31498
- EPSS 0.12%
- Veröffentlicht 08.04.2025 13:53:11
- Zuletzt bearbeitet 08.04.2025 18:13:53
c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4, there is a use-after-free in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support ...
CVE-2024-25629
- EPSS 0.04%
- Veröffentlicht 23.02.2024 15:15:09
- Zuletzt bearbeitet 05.02.2025 21:41:30
c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hos...
CVE-2020-22217
- EPSS 0.25%
- Veröffentlicht 22.08.2023 19:16:19
- Zuletzt bearbeitet 21.11.2024 05:13:11
Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c.
CVE-2020-14354
- EPSS 0.17%
- Veröffentlicht 13.05.2021 14:15:17
- Zuletzt bearbeitet 21.11.2024 05:03:04
A possible use-after-free and double-free in c-ares lib version 1.16.0 if ares_destroy() is called prior to ares_getaddrinfo() completing. This flaw possibly allows an attacker to crash the service that uses c-ares lib. The highest threat from this v...
CVE-2017-1000381
- EPSS 0.66%
- Veröffentlicht 07.07.2017 17:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
CVE-2016-5180
- EPSS 19.37%
- Veröffentlicht 03.10.2016 15:59:03
- Zuletzt bearbeitet 12.04.2025 10:46:40
Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot.