CVE-2023-31130
Public on 2023-05-22
Modified on 2024-02-10
Description
ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist().
However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues.
However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues.
Severity
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 1 | c-ares | Pending Fix | ||
Amazon Linux 2 - Core | c-ares | 2024-01-03 | ALAS2-2024-2399 | Fixed |
Amazon Linux 2023 | c-ares | 2023-06-05 | ALAS2023-2023-198 | Fixed |
Amazon Linux 2 - Ecs Extra | ecs-service-connect-agent | 2023-09-14 | ALAS2ECS-2023-007 | Fixed |
Amazon Linux 2023 | ecs-service-connect-agent | 2023-09-14 | ALAS2023-2023-344 | Fixed |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 5.3 | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H |
NVD | CVSSv3 | 4.1 | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H |