Vulnerability Details : CVE-2023-31130
c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1.
Products affected by CVE-2023-31130
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
- cpe:2.3:a:c-ares_project:c-ares:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-31130
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 15 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-31130
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.5
|
5.9
|
NIST | |
4.1
|
MEDIUM | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H |
0.5
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2023-31130
-
The product writes to a buffer using an index or pointer that references a memory location prior to the beginning of the buffer.Assigned by: security-advisories@github.com (Secondary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-31130
-
https://security.netapp.com/advisory/ntap-20240605-0005/
CVE-2023-31130 c-ares Vulnerability in NetApp Products | NetApp Product Security
-
https://lists.debian.org/debian-lts-announce/2023/06/msg00034.html
[SECURITY] [DLA 3471-1] c-ares security updateMailing List
-
https://security.gentoo.org/glsa/202310-09
c-ares: Multiple Vulnerabilities (GLSA 202310-09) — Gentoo securityThird Party Advisory
-
https://www.debian.org/security/2023/dsa-5419
Debian -- Security Information -- DSA-5419-1 c-aresThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
[SECURITY] Fedora 37 Update: c-ares-1.19.1-1.fc37 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
Release 1.19.1 · c-ares/c-ares · GitHubRelease Notes
-
https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v
Buffer Underwrite in ares_inet_net_pton() · Advisory · c-ares/c-ares · GitHubThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
[SECURITY] Fedora 38 Update: c-ares-1.19.1-1.fc38 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
Jump to