Heap-based buffer overflow in c-ares - CVE-2016-5180
Published: October 3, 2016 / Updated: July 28, 2020
c-ares
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0. A remote attacker can use a hostname with an escaped trailing dot. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2016-5180
Sources
- http://rhn.redhat.com/errata/RHSA-2017-0002.html
- http://www.debian.org/security/2016/dsa-3682
- http://www.securityfocus.com/bid/93243
- http://www.ubuntu.com/usn/USN-3143-1
- https://c-ares.haxx.se/adv_20160929.html
- https://c-ares.haxx.se/CVE-2016-5180.patch
- https://googlechromereleases.blogspot.in/2016/09/stable-channel-updates-for-chrome-os.html
- https://security.gentoo.org/glsa/201701-28
- https://source.android.com/security/bulletin/2017-01-01.html