c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1.
{
"cwe_ids": [
"CWE-400"
],
"cna_assigner": "GitHub_M",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/32xxx/CVE-2023-32067.json"
}{
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "1.19.1"
}
],
"cpe": "cpe:2.3:a:c-ares_project:c-ares:*:*:*:*:*:*:*:*",
"source": [
"CPE_FIELD",
"REFERENCES"
]
}