PT-2020-6395 · C-Ares +1 · C-Ares +1
Jann Horn
·
Published
2020-05-07
·
Updated
2023-09-15
·
CVE-2020-14354
3.3
Low
Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |
Name of the Vulnerable Software and Affected Versions:
c-ares lib version 1.16.0
Description:
The issue is related to a possible use-after-free and double-free in the c-ares library. This occurs when `ares destroy()` is called before `ares getaddrinfo()` completes. The flaw could allow an attacker to crash the service that uses the c-ares library, with the highest threat being to the service's availability.
Recommendations:
For c-ares lib version 1.16.0, ensure that `ares getaddrinfo()` completes before calling `ares destroy()` to prevent potential crashes. As a temporary workaround, consider avoiding the use of `ares destroy()` until `ares getaddrinfo()` has finished, or implement a delay between these function calls to minimize the risk of exploitation. At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
Double Free
Buffer Overflow
Use After Free
Related Identifiers
Affected Products
References · 41
- 🔥 https://github.com/masahiro331/CVE-2020-8277⭐ 7 🔗 2 · Exploit
- 🔥 https://bugzilla.redhat.com/show_bug.cgi?id=1866838 · Exploit
- 🔥 https://packetstormsecurity.com/files/158755/GS20200804145053.txt · Exploit
- https://github.com/c-ares/c-ares/commit/1cc7e83c3bdfaafbc5919c95025592d8de3a170e⭐ 1882 🔗 609 · Patch
- https://bdu.fstec.ru/vul/2023-01258 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4904 · Security Note
- https://osv.dev/vulnerability/CVE-2020-14354 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31124 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32067 · Security Note
- https://errata.altlinux.org/ALT-PU-2020-2054 · Vendor Advisory
- https://bdu.fstec.ru/vul/2022-00342 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/702250 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14354 · Security Note
- https://bdu.fstec.ru/vul/2023-07647 · Security Note
- https://bdu.fstec.ru/vul/2021-01024 · Security Note