Skip to content

Buffer Underwrite in ares_inet_net_pton()

Moderate
bradh352 published GHSA-x6mf-cxr9-8q6v May 22, 2023

Package

c-ares

Affected versions

< 1.19.1

Patched versions

1.19.1

Description

Impact

ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist().

However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues.

Patches

Fixed in 1.19.1

Workarounds

No workarounds are available.

Credit

Hannes Moesl
X41 D-SEC GmbH
Audit funded by Open Source Technology Improvement Fund (OSTIF)

Severity

Moderate
4.1
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
High
Privileges required
High
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

CVE ID

CVE-2023-31130

Weaknesses