CVE-2023-32067

c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
GitHub_MCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 54%
VendorProductVersion
c-ares_projectc-ares
𝑥
< 1.19.1
debiandebian_linux
10.0
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
c-ares
bullseye (security)
1.17.1-1+deb11u3
fixed
bullseye
1.17.1-1+deb11u3
fixed
bookworm
1.18.1-3
fixed
trixie
1.34.4-1
fixed
sid
1.34.4-2.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
c-ares
mantic
not-affected
lunar
Fixed 1.18.1-2ubuntu0.1
released
kinetic
Fixed 1.18.1-1ubuntu0.22.10.2
released
jammy
Fixed 1.18.1-1ubuntu0.22.04.2
released
focal
Fixed 1.15.0-1ubuntu0.3
released
bionic
Fixed 1.14.0-1ubuntu0.2+esm1
released
xenial
Fixed 1.10.0-3ubuntu0.2+esm2
released
trusty
ignored