When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow information leakage.
References
Link | Resource |
---|---|
https://github.com/NLnetLabs/ldns/issues/51 | Exploit Issue Tracking Third Party Advisory |
https://cwe.mitre.org/data/definitions/126.html | Third Party Advisory |
Configurations
Information
Published : 2022-01-21 07:15
Updated : 2022-10-05 10:08
NVD link : CVE-2020-19861
Mitre link : CVE-2020-19861
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
nlnetlabs
- ldns