First published: Wed May 24 2023(Updated: )
Description of issue(s): When /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output. Input from the random number generator is fed into a non-compilant RC4 implementation and may not be as strong as the original RC4 implementation. No attempt is made to look for modern OS-provided CSPRNGs like arc4random() that is widely available. <a href="https://access.redhat.com/security/cve/CVE-2023-31147">CVE-2023-31147</a> Insufficient randomness in generation of DNS query IDs (<a href="https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2">https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2</a>)
Affected Software | Affected Version | How to fix |
---|---|---|
C-ares |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2209501 is considered high due to the predictability of DNS query IDs that may lead to security vulnerabilities.
To fix REDHAT-BUG-2209501, update to a patched version of c-ares that uses a secure random number generator.
The potential risks include exposure to DNS spoofing attacks due to predictable random number generation.
All versions of c-ares that rely on the rand() function for generating DNS query IDs are affected by REDHAT-BUG-2209501.
There are no effective workarounds for REDHAT-BUG-2209501 aside from upgrading to a secure version of c-ares.