Описание
When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow information leakage.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 1.7.0-3ubuntu4.1 |
| devel | not-affected | 1.8.1-1 |
| esm-apps/focal | released | 1.7.0-4.1ubuntu1+esm1 |
| esm-apps/jammy | released | 1.7.1-2ubuntu4+esm1 |
| esm-apps/noble | not-affected | 1.8.1-1 |
| esm-infra/bionic | released | 1.7.0-3ubuntu4.1 |
| esm-infra/xenial | released | 1.6.17-8ubuntu0.1+esm1 |
| focal | ignored | end of standard support, was needed |
| impish | ignored | end of life |
| jammy | needed |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow information leakage.
When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow information leakage.
When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt ...
When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow information leakage.
Уязвимость функции ldns_nsec3_salt_data библиотеки DNS LDNS, позволяющая нарушителю получить доступ к конфиденциальным данным
EPSS
5 Medium
CVSS2
7.5 High
CVSS3