c-ares vulnerabilities
This is all known and public c-ares vulnerabilities to date. See also our security incident process.

CVE-2024-25629 - Feb 23 2024

Moderate. Reading malformatted

/etc/resolv.conf
,
/etc/nsswitch.conf
or the
HOSTALIASES
file could result in a crash. Fixed in 1.27.0. CVE-2024-25629

CVE-2023-32067 - May 22 2023

High. 0-byte UDP payload causes Denial of Service. Fixed in 1.19.1. CVE-2023-32067

CVE-2023-31147 - May 22 2023

Moderate. Insufficient randomness in generation of DNS query IDs. Fixed in 1.19.1. CVE-2023-31147

CVE-2023-31130 - May 22 2023

Moderate. Buffer Underwrite in ares_inet_net_pton(). Fixed in 1.19.1. CVE-2023-31130

CVE-2023-31124 - May 22 2023

Low. AutoTools does not set CARES_RANDOM_FILE during cross compilation. Fixed in 1.19.1. CVE-2023-31124

CVE-2022-4904 - Feb 17 2023

The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity. Fixed in 1.19.0 CVE-2022-4904

CVE-2021-3672 - August 10 2021

Missing input validation on hostnames returned by DNS servers

CVE-2017-1000381 - June 20 2017

NAPTR parser out of bounds access

CVE-2016-5180 - Sep 29 2016

ares_create_query single byte out of buffer write

CVE-2007-3153 - Jun 8 2007

The ares_init:randomize_key function uses the rand command to produce random numbers. A remote attacker could exploit this vulnerability to possibly spoof hostnames and addresses in the DNS cache. project advisory.

For unknown reasons, it seems CVE-2007-3152 is also often used to refer to this same issue.

This flaw was fixed in 1.4.0.