An exploitable denial-of-service vulnerability exists in the resource allocation handling of Videolabs libmicrodns 0.1.0. When encountering errors while parsing mDNS messages, some allocated data is not freed, possibly leading to a denial-of-service condition via resource exhaustion. An attacker can send one mDNS message repeatedly to trigger this vulnerability through the function rr_read_RR [5] reads the current resource record, except for the RDATA section. This is read by the loop at in rr_read. For each RR type, a different function is called. When the RR type is 0x10, the function rr_read_TXT is called at [6].
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1002 | Exploit Technical Description Third Party Advisory |
https://www.debian.org/security/2020/dsa-4671 | Third Party Advisory |
https://security.gentoo.org/glsa/202005-10 | Third Party Advisory |
Information
Published : 2020-03-24 14:15
Updated : 2022-04-22 12:06
NVD link : CVE-2020-6080
Mitre link : CVE-2020-6080
JSON object : View
CWE
CWE-401
Missing Release of Memory after Effective Lifetime
Products Affected
videolabs
- libmicrodns
debian
- debian_linux