First published: Thu Aug 06 2020(Updated: )
A possible use-after-free and double-free in c-ares lib version 1.16.0 if ares_destroy() is called prior to ares_getaddrinfo() completing. This flaw possibly allows an attacker to crash the service that uses c-ares lib. The highest threat from this vulnerability is to this service availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
C-ares C-ares | =1.16.0 | |
Fedoraproject Fedora | =33 | |
redhat/c-ares | <1.16.1 | 1.16.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14354 is a vulnerability in the c-ares library (version 1.16.0) that can lead to a use-after-free and double-free condition if the ares_destroy() function is called before ares_getaddrinfo() completes.
CVE-2020-14354 can cause the service that uses the c-ares library to crash, resulting in a potential denial-of-service (DoS) situation.
The severity of CVE-2020-14354 is medium, with a severity value of 3.3.
The c-ares library version 1.16.0 is affected by CVE-2020-14354. Fedora version 33 is also affected.
To fix CVE-2020-14354, update your c-ares library to version 1.16.1 or higher.