CVE-2023-32067
Public on 2023-05-23
Modified on 2024-02-07
Description
Denial of Service.
Attack Steps:
The target resolver sends a query
The attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver
The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. (this is only valid for TCP connections, UDP is connection-less)
Current resolution fails, DoS attack is achieved.
Attack Steps:
The target resolver sends a query
The attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver
The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. (this is only valid for TCP connections, UDP is connection-less)
Current resolution fails, DoS attack is achieved.
Severity
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 1 | c-ares | 2023-06-21 | ALAS-2023-1770 | Fixed |
Amazon Linux 2 - Core | c-ares | 2023-07-17 | ALAS2-2023-2127 | Fixed |
Amazon Linux 2023 | c-ares | 2023-06-05 | ALAS2023-2023-198 | Fixed |
Amazon Linux 2 - Ecs Extra | ecs-service-connect-agent | 2023-09-14 | ALAS2ECS-2023-007 | Fixed |
Amazon Linux 2023 | ecs-service-connect-agent | 2023-09-14 | ALAS2023-2023-344 | Fixed |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
NVD | CVSSv3 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |