A possible use-after-free and double-free in c-ares lib version 1.16.0 if aresdestroy() is called prior to aresgetaddrinfo() completing. This flaw possibly allows an attacker to crash the service that uses c-ares lib. The highest threat from this vulnerability is to this service availability.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-14354.json"
[
{
"source": "https://github.com/c-ares/c-ares/commit/1cc7e83c3bdfaafbc5919c95025592d8de3a170e",
"id": "CVE-2020-14354-0943984d",
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "ares_getaddrinfo.c",
"function": "host_callback"
},
"deprecated": false,
"digest": {
"function_hash": "41641729463172895225490036612231902270",
"length": 625.0
}
},
{
"source": "https://github.com/c-ares/c-ares/commit/1cc7e83c3bdfaafbc5919c95025592d8de3a170e",
"id": "CVE-2020-14354-61d1432b",
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "ares_getaddrinfo.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"188514934666865950876588083814903200380",
"216654447602516332471211556636820849519",
"280935007277571070082878613853237796717",
"123115424187489169459219809240179726727"
],
"threshold": 0.9
}
}
]