First published: Wed May 24 2023(Updated: )
c-ares is an asynchronous resolver library. When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android. This will downgrade to using rand() as a fallback which could allow an attacker to take advantage of the lack of entropy by not using a CSPRNG. This issue was patched in version 1.19.1.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
C-ares Project C-ares | <1.19.1 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31124 is a vulnerability in the c-ares asynchronous resolver library that downgrades to using rand() as a fallback, allowing an attacker to take advantage of the lack of randomness in cryptographic keys.
CVE-2023-31124 has a severity level of medium, with a CVSS score of 6.5.
Versions up to and excluding 1.19.1 of the c-ares library and Fedora versions 37 and 38 are affected by CVE-2023-31124.
An attacker can exploit CVE-2023-31124 by taking advantage of the lack of randomness in cryptographic keys generated by the fallback rand() function.
You can find more information about CVE-2023-31124 at the following references: [Red Hat Security Advisory](https://access.redhat.com/security/cve/CVE-2023-31124), [GitHub Security Advisory](https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4), [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2209542).