7.5
CVSSv3

CVE-2017-1000381

Published: 07/07/2017 Updated: 15/09/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

c-ares project c-ares 1.11.0

c-ares c-ares 1.9.1

c-ares c-ares 1.8.0

c-ares c-ares 1.10.0

c-ares c-ares 1.9.0

c-ares c-ares 1.12.0

nodejs node.js

Vendor Advisories

Synopsis Moderate: rh-nodejs6-nodejs security update Type/Severity Security Advisory: Moderate Topic An update for rh-nodejs6-nodejs is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System ...
Debian Bug report logs - #865360 c-ares: CVE-2017-1000381: NAPTR parser out of bounds access Package: src:c-ares; Maintainer for src:c-ares is Gregor Jasny <gjasny@googlemailcom>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 20 Jun 2017 17:12:07 UTC Severity: important Tags: patch, security, upst ...
c-ares could be made to crash if it received specially crafted network traffic ...
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way ( CVE-2017-1000381 ) ...
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way ...
A out-of-bounds read has been found in c-ares < 1130 The ares_parse_naptr_reply() function, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way ...