Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 09 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
C-ares
C-ares c-ares |
|
| Vendors & Products |
C-ares
C-ares c-ares |
Mon, 08 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | c-ares is an asynchronous resolver library. Versions 1.32.3 through 1.34.5 terminate a query after maximum attempts when using read_answer() and process_answer(), which can cause a Denial of Service. This issue is fixed in version 1.34.6. | |
| Title | c-ares has a Use After Free vulnerability when connection is cleaned up after error | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-09T16:05:06.098Z
Reserved: 2025-10-13T16:26:12.178Z
Link: CVE-2025-62408
Updated: 2025-12-09T14:20:06.524Z
Status : Awaiting Analysis
Published: 2025-12-08T22:15:52.620
Modified: 2025-12-09T18:37:33.427
Link: CVE-2025-62408
No data.
OpenCVE Enrichment
Updated: 2025-12-09T10:04:48Z