Vulnerability Details CVE-2022-4904
A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 35.2%
CVSS Severity
CVSS v3 Score 8.6
Products affected by CVE-2022-4904
-
cpe:2.3:a:c-ares_project:c-ares:-
-
cpe:2.3:a:c-ares_project:c-ares:1.0.0
-
cpe:2.3:a:c-ares_project:c-ares:1.1.0
-
cpe:2.3:a:c-ares_project:c-ares:1.10.0
-
cpe:2.3:a:c-ares_project:c-ares:1.11.0
-
cpe:2.3:a:c-ares_project:c-ares:1.12.0
-
cpe:2.3:a:c-ares_project:c-ares:1.13.0
-
cpe:2.3:a:c-ares_project:c-ares:1.14.0
-
cpe:2.3:a:c-ares_project:c-ares:1.15.0
-
cpe:2.3:a:c-ares_project:c-ares:1.16.0
-
cpe:2.3:a:c-ares_project:c-ares:1.16.1
-
cpe:2.3:a:c-ares_project:c-ares:1.17.0
-
cpe:2.3:a:c-ares_project:c-ares:1.17.1
-
cpe:2.3:a:c-ares_project:c-ares:1.17.2
-
cpe:2.3:a:c-ares_project:c-ares:1.18.0
-
cpe:2.3:a:c-ares_project:c-ares:1.18.1
-
cpe:2.3:a:c-ares_project:c-ares:1.2.0
-
cpe:2.3:a:c-ares_project:c-ares:1.2.1
-
cpe:2.3:a:c-ares_project:c-ares:1.3.0
-
cpe:2.3:a:c-ares_project:c-ares:1.3.1
-
cpe:2.3:a:c-ares_project:c-ares:1.3.2
-
cpe:2.3:a:c-ares_project:c-ares:1.4.0
-
cpe:2.3:a:c-ares_project:c-ares:1.5.0
-
cpe:2.3:a:c-ares_project:c-ares:1.5.1
-
cpe:2.3:a:c-ares_project:c-ares:1.5.2
-
cpe:2.3:a:c-ares_project:c-ares:1.5.3
-
cpe:2.3:a:c-ares_project:c-ares:1.6.0
-
cpe:2.3:a:c-ares_project:c-ares:1.7.0
-
cpe:2.3:a:c-ares_project:c-ares:1.7.1
-
cpe:2.3:a:c-ares_project:c-ares:1.7.2
-
cpe:2.3:a:c-ares_project:c-ares:1.7.3
-
cpe:2.3:a:c-ares_project:c-ares:1.7.4
-
cpe:2.3:a:c-ares_project:c-ares:1.7.5
-
cpe:2.3:a:c-ares_project:c-ares:1.8.0
-
cpe:2.3:a:c-ares_project:c-ares:1.9.0
-
cpe:2.3:a:c-ares_project:c-ares:1.9.1
-
cpe:2.3:a:redhat:software_collections:-
-
cpe:2.3:o:fedoraproject:fedora:36
-
cpe:2.3:o:redhat:enterprise_linux:8.0
-
cpe:2.3:o:redhat:enterprise_linux:9.0