CVE-2023-32067

c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:c-ares_project:c-ares:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-05-25 23:15

Updated : 2024-06-10 18:15


NVD link : CVE-2023-32067

Mitre link : CVE-2023-32067

CVE.ORG link : CVE-2023-32067


JSON object : View

Products Affected

debian

  • debian_linux

c-ares_project

  • c-ares

fedoraproject

  • fedora
CWE
NVD-CWE-noinfo CWE-400

Uncontrolled Resource Consumption