CVE-2024-25629

c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.4 MEDIUM
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
GitHub_MCNA
4.4 MEDIUM
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 9%
VendorProductVersion
c-aresc-ares
𝑥
< 1.27.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
c-ares
bullseye (security)
vulnerable
bullseye
no-dsa
bookworm
no-dsa
buster
no-dsa
sid
1.34.5-1
fixed
trixie
1.34.5-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
c-ares
mantic
Fixed 1.19.1-3ubuntu0.1
released
jammy
Fixed 1.18.1-1ubuntu0.22.04.3
released
focal
Fixed 1.15.0-1ubuntu0.5
released
bionic
Fixed 1.14.0-1ubuntu0.2+esm2
released
xenial
Fixed 1.10.0-3ubuntu0.2+esm3
released
trusty
ignored