CVE-2017-1000381

Published: 07 July 2017

The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.

From the Ubuntu security team

It was discovered that c-ares incorrectly handled certain NAPTR responses. A remote attacker could possibly use this issue to cause applications using c-ares to crash, resulting in a denial of service.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
c-ares
Launchpad, Ubuntu, Debian
Upstream
Released (1.13.0,1.12.0-4)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(1.12.0-4)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1.12.0-4)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(1.12.0-4)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (1.10.0-3ubuntu0.2)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [1.10.0-2ubuntu0.2])
Ubuntu 12.04 ESM (Precise Pangolin) Does not exist

Patches:
Upstream: https://c-ares.haxx.se/CVE-2017-1000381.patch
nodejs
Launchpad, Ubuntu, Debian
Upstream
Released (4.8.4, 6.11.1, 8.1.4)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(8.1.4)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(8.1.4)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(8.1.4)
Ubuntu 16.04 LTS (Xenial Xerus) Needed

Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable
(uses system ares)
Ubuntu 12.04 ESM (Precise Pangolin) Does not exist

Patches:
Upstream: https://github.com/nodejs/node/commit/80fe2662e4