CVE-2020-19861Out-of-bounds Read in Ldns

Severity
7.5HIGHNVD
OSV6.5
EPSS
0.3%
top 43.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 21
Latest updateOct 4

Description

When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow information leakage.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

debiandebian/ldns< ldns 1.8.1-1 (bookworm)
Debiannlnetlabs/ldns< 1.8.1-1+2
Ubuntunlnetlabs/ldns< 1.7.0-3ubuntu4.1+3
NVDnlnetlabs/ldns1.7.1

🔴Vulnerability Details

4
OSV
ldns vulnerabilities2022-10-04
OSV
ldns vulnerabilities2022-01-31
GHSA
GHSA-fhv5-v23r-vj74: When a zone file in ldns 12022-01-22
OSV
CVE-2020-19861: When a zone file in ldns 12022-01-21

📋Vendor Advisories

4
Ubuntu
ldns vulnerabilities2022-10-04
Ubuntu
ldns vulnerabilities2022-01-31
Red Hat
ldns: Heap out-of-bound read vulnerability in ldns_nsec3_salt_data function2021-09-26
Debian
CVE-2020-19861: ldns - When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is t...2020