First published: Wed May 24 2023(Updated: )
<a href="https://access.redhat.com/security/cve/CVE-2023-32067">CVE-2023-32067</a>. 0-byte UDP payload causes Denial of Service (<a href="https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc">https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc</a>)
Affected Software | Affected Version | How to fix |
---|---|---|
C-ares |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2209502, related to CVE-2023-32067, is classified as a Denial of Service vulnerability.
To fix REDHAT-BUG-2209502, update to the latest version of c-ares that addresses CVE-2023-32067.
c-ares is the affected software in the REDHAT-BUG-2209502 vulnerability.
The impact of REDHAT-BUG-2209502 can lead to a Denial of Service condition due to a 0-byte UDP payload.
REDHAT-BUG-2209502 was reported in context with the discovery of CVE-2023-32067.