Vulnerability Name: | CVE-2020-14354 (CCN-202060) | ||||||||||||
Assigned: | 2020-07-22 | ||||||||||||
Published: | 2020-07-22 | ||||||||||||
Updated: | 2022-04-26 | ||||||||||||
Summary: | A possible use-after-free and double-free in c-ares lib version 1.16.0 if ares_destroy() is called prior to ares_getaddrinfo() completing. This flaw possibly allows an attacker to crash the service that uses c-ares lib. The highest threat from this vulnerability is to this service availability. | ||||||||||||
CVSS v3 Severity: | 3.3 Low (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) 3.0 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C)
5.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-415 CWE-416 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-14354 Source: CCN Type: Red Hat Bugzilla Bug 1866838 (CVE-2020-14354) - CVE-2020-14354 c-ares: ares_destroy() with pending ares_getaddrinfo() leads to Use-After-Free Source: MISC Type: Exploit, Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1866838 Source: CCN Type: c-ares Web site c-ares Source: MISC Type: Release Notes, Vendor Advisory https://c-ares.haxx.se/changelog.html Source: XF Type: UNKNOWN cares-cve202014354-dos(202060) Source: MISC Type: Patch, Third Party Advisory https://github.com/c-ares/c-ares/commit/1cc7e83c3bdfaafbc5919c95025592d8de3a170e Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-43d5a372fc Source: MISC Type: Exploit, Third Party Advisory, VDB Entry https://packetstormsecurity.com/files/158755/GS20200804145053.txt | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||
BACK |