ArchLinux: 201707-21: c-ares: information disclosure
Summary
A out-of-bounds read has been found in c-ares < 1.13.0. The ares_parse_naptr_reply() function, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
Resolution
Upgrade to 1.13.0-1.
# pacman -Syu "c-ares>=1.13.0-1"
The problem has been fixed upstream in version 1.13.0.
References
https://c-ares.haxx.se/adv_20170620.html https://security.archlinux.org/CVE-2017-1000381
Workaround
None.