PT-2020-6395 · C-Ares +1 · C-Ares +1

Jann Horn

·

Published

2020-05-07

·

Updated

2023-09-15

·

CVE-2020-14354

CVSS v3.1
3.3
VectorAV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Name of the Vulnerable Software and Affected Versions:

c-ares lib version 1.16.0

Description:

The issue is related to a possible use-after-free and double-free in the c-ares library. This occurs when `ares destroy()` is called before `ares getaddrinfo()` completes. The flaw could allow an attacker to crash the service that uses the c-ares library, with the highest threat being to the service's availability.

Recommendations:

For c-ares lib version 1.16.0, ensure that `ares getaddrinfo()` completes before calling `ares destroy()` to prevent potential crashes. As a temporary workaround, consider avoiding the use of `ares destroy()` until `ares getaddrinfo()` has finished, or implement a delay between these function calls to minimize the risk of exploitation. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

Double Free

Buffer Overflow

Use After Free

Weakness Enumeration

Related Identifiers

ALT-PU-2020-2054
ALT-PU-2020-3198
ALT-PU-2022-3071
ALT-PU-2023-5121
BDU:2021-04594
CVE-2020-14354

Affected Products

Alt Linux
C-Ares