c-ares is an asynchronous resolver library. Versions 1.32.3 through 1.34.5 terminate a query after maximum attempts when using read_answer() and process_answer(), which can cause a Denial of Service. This issue is fixed in version 1.34.6.
References
| Link | Resource |
|---|---|
| https://github.com/c-ares/c-ares/commit/714bf5675c541bd1e668a8db8e67ce012651e618 | Patch |
| https://github.com/c-ares/c-ares/security/advisories/GHSA-jq53-42q6-pqr5 | Patch Vendor Advisory |
Configurations
History
02 Feb 2026, 14:40
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
C-ares
C-ares c-ares |
|
| References | () https://github.com/c-ares/c-ares/commit/714bf5675c541bd1e668a8db8e67ce012651e618 - Patch | |
| References | () https://github.com/c-ares/c-ares/security/advisories/GHSA-jq53-42q6-pqr5 - Patch, Vendor Advisory | |
| CPE | cpe:2.3:a:c-ares:c-ares:*:*:*:*:*:*:*:* |
08 Dec 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-08 22:15
Updated : 2026-02-02 14:40
NVD link : CVE-2025-62408
Mitre link : CVE-2025-62408
CVE.ORG link : CVE-2025-62408
JSON object : View
Products Affected
c-ares
- c-ares
CWE
CWE-416
Use After Free
