CVE-2024-25629Buffer Under-read in C-ares

Severity
5.5MEDIUMNVD
CNA4.4
EPSS
0.1%
top 82.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 23
Latest updateMar 6

Description

c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

CVEListV5c-ares/c-ares< 1.27.0
NVDc-ares/c-ares< 1.27.0
Debianc-ares/c-ares< 1.27.0-1+1

Also affects: Fedora 38, 39, 40

Patches

🔴Vulnerability Details

2
OSV
CVE-2024-25629: c-ares is a C library for asynchronous DNS requests2024-02-23
CVEList
c-ares out of bounds read in ares__read_line()2024-02-23

📋Vendor Advisories

4
Ubuntu
c-ares vulnerability2024-03-06
Red Hat
c-ares: Out of bounds read in ares__read_line()2024-02-23
Microsoft
c-ares out of bounds read in ares__read_line()2024-02-13
Debian
CVE-2024-25629: c-ares - c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used...2024
CVE-2024-25629 — Buffer Under-read in C-ares | cvebase