Subject: [ASA-201707-21] c-ares: information disclosure Arch Linux Security Advisory ASA-201707-21 ========================================== Severity: Medium Date : 2017-07-18 CVE-ID : CVE-2017-1000381 Package : c-ares Type : information disclosure Remote : Yes Link : https://security.archlinux.org/AVG-315 Summary ======= The package c-ares before version 1.13.0-1 is vulnerable to information disclosure. Resolution ========== Upgrade to 1.13.0-1. # pacman -Syu "c-ares>=1.13.0-1" The problem has been fixed upstream in version 1.13.0. Workaround ========== None. Description =========== A out-of-bounds read has been found in c-ares < 1.13.0. The ares_parse_naptr_reply() function, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way. Impact ====== A remote attacker might be able to access sensitive information by responding to a DNS query with a crafted response packet. References ========== https://c-ares.haxx.se/adv_20170620.html https://security.archlinux.org/CVE-2017-1000381