CVE-2020-14354

LOW

C-ares - Use After Free

Title source: rule
STIX 2.1

Description

A possible use-after-free and double-free in c-ares lib version 1.16.0 if ares_destroy() is called prior to ares_getaddrinfo() completing. This flaw possibly allows an attacker to crash the service that uses c-ares lib. The highest threat from this vulnerability is to this service availability.

References (5)

Core 5
Core References
Exploit, Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=1866838
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
https://packetstormsecurity.com/files/158755/GS20200804145053.txt
Release Notes, Vendor Advisory x_refsource_misc
https://c-ares.haxx.se/changelog.html

Scores

CVSS v3 3.3
EPSS 0.0019
EPSS Percentile 40.3%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Details

CWE
CWE-416 CWE-415 CWE-120
Status published
Products (2)
c-ares/c-ares 1.16.0
fedoraproject/fedora 33
Published May 13, 2021
Tracked Since Feb 18, 2026