CVE Vulnerabilities

CVE-2023-32067

Uncontrolled Resource Consumption

Published: May 25, 2023 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
C-aresC-ares_project*1.19.1 (excluding)
Red Hat Enterprise Linux 7RedHatc-ares-0:1.10.0-3.el7_9.1*
Red Hat Enterprise Linux 8RedHatnodejs:16-8080020230608150024.63b34585*
Red Hat Enterprise Linux 8RedHatnodejs:18-8080020230607122508.63b34585*
Red Hat Enterprise Linux 8RedHatc-ares-0:1.13.0-6.el8_8.2*
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsRedHatc-ares-0:1.13.0-5.el8_1.1*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatc-ares-0:1.13.0-5.el8_2.1*
Red Hat Enterprise Linux 8.2 Telecommunications Update ServiceRedHatc-ares-0:1.13.0-5.el8_2.1*
Red Hat Enterprise Linux 8.2 Update Services for SAP SolutionsRedHatc-ares-0:1.13.0-5.el8_2.1*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatc-ares-0:1.13.0-5.el8_4.2*
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceRedHatc-ares-0:1.13.0-5.el8_4.2*
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRedHatc-ares-0:1.13.0-5.el8_4.2*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatnodejs:16-8060020230620060944.ad008a3a*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatc-ares-0:1.13.0-6.el8_6.1*
Red Hat Enterprise Linux 9RedHatc-ares-0:1.17.1-5.el9_2.1*
Red Hat Enterprise Linux 9RedHatnodejs:18-9020020230531092345.rhel9*
Red Hat Enterprise Linux 9RedHatnodejs-1:16.19.1-2.el9_2*
Red Hat Enterprise Linux 9RedHatc-ares-0:1.17.1-5.el9_2.1*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatc-ares-0:1.17.1-5.el9_0.1*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatnodejs-1:16.18.1-4.el9_0*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-nodejs14-nodejs-0:14.21.3-4.el7*
C-aresUbuntubionic*
C-aresUbuntuesm-infra/bionic*
C-aresUbuntuesm-infra/focal*
C-aresUbuntuesm-infra/xenial*
C-aresUbuntufocal*
C-aresUbuntujammy*
C-aresUbuntukinetic*
C-aresUbuntulunar*
C-aresUbuntutrusty*
C-aresUbuntuupstream*
C-aresUbuntuxenial*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References