Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-26913.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-26913
Upstream
Published
2023-05-25T23:15:09Z
Modified
2026-04-01T05:08:49.974521Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
CVE-2023-32067 affecting package c-ares for versions less than 1.19.1-1
Details

c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1.

References

Affected packages

Azure Linux:2 / c-ares

Package

Name
c-ares
Purl
pkg:rpm/azure-linux/c-ares

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.19.1-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-26913.json"