CVE-2025-31498


     Impact

Use after free() in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support EDNS, or possibly on TCP queries if the remote closed the connection immediately after a response. If there was an issue trying to put that new transaction on the wire, it would close the connection handle, but read_answers() was still expecting the connection handle to be available to possibly dequeue other responses.

In theory a remote attacker might be able to trigger this by flooding the target with ICMP UNREACHABLE packets if they also control the upstream nameserver and can return a result with one of those conditions, this has been untested. Otherwise only a local attacker might be able to change system behavior to make send()/write() return a failure condition.


     Patches

Versions 1.32.3 - 1.34.4 are affected. Patch in 1.34.5.


     Workarounds

None


     References

c-ares started handling UDP write failures in 1.32.3 in PR#821 <https://github.com/c-ares/c-ares/pull/821>whereas they were previously ignored, thus uncovering this particular issue.

https://github.com/c-ares/c-ares/releases/tag/v1.34.5


     Credit


Reported by Erik Lax

Reply via email to