CVE Vulnerabilities

CVE-2024-25629

Buffer Under-read

Published: Feb 23, 2024 | Modified: Feb 05, 2025
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
4.4 LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

c-ares is a C library for asynchronous DNS requests. ares__read_line() is used to parse local configuration files such as /etc/resolv.conf, /etc/nsswitch.conf, the HOSTALIASES file, and if using a c-ares version prior to 1.27.0, the /etc/hosts file. If any of these configuration files has an embedded NULL character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist.

Weakness

The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations prior to the targeted buffer.

Affected Software

NameVendorStart VersionEnd Version
C-aresC-ares*1.27.0 (excluding)
Red Hat Enterprise Linux 8RedHatnodejs:20-8090020240422150739.a75119d5*
Red Hat Enterprise Linux 8RedHatnodejs:18-8090020240429131734.a75119d5*
Red Hat Enterprise Linux 8RedHatc-ares-0:1.13.0-11.el8_10*
Red Hat Enterprise Linux 9RedHatnodejs:18-9040020240422140329.rhel9*
Red Hat Enterprise Linux 9RedHatnodejs:20-9040020240419140200.rhel9*
Red Hat Enterprise Linux 9RedHatnodejs-1:16.20.2-8.el9_4*
Red Hat Enterprise Linux 9RedHatc-ares-0:1.19.1-2.el9_4*
Red Hat Enterprise Linux 9RedHatc-ares-0:1.19.1-2.el9_4*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHatnodejs-1:16.20.2-9.el9_0*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatnodejs-1:16.20.2-6.el9_2.3*
C-aresUbuntubionic*
C-aresUbuntuesm-infra/bionic*
C-aresUbuntuesm-infra/focal*
C-aresUbuntuesm-infra/xenial*
C-aresUbuntufocal*
C-aresUbuntujammy*
C-aresUbuntumantic*
C-aresUbuntutrusty*
C-aresUbuntuupstream*
C-aresUbuntuxenial*

References