Description
When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow information leakage.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2910-1 | ldns security update |
EUVD |
EUVD-2020-11757 | When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow information leakage. |
Ubuntu USN |
USN-5257-1 | ldns vulnerabilities |
Ubuntu USN |
USN-5257-2 | ldns vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T14:15:28.490Z
Reserved: 2020-08-13T00:00:00.000Z
Link: CVE-2020-19861
No data.
Status : Modified
Published: 2022-01-21T15:15:07.607
Modified: 2024-11-21T05:09:26.213
Link: CVE-2020-19861
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN