When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow information leakage.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-2910-1 | ldns security update |
![]() |
EUVD-2020-11757 | When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow information leakage. |
![]() |
USN-5257-1 | ldns vulnerabilities |
![]() |
USN-5257-2 | ldns vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T14:15:28.490Z
Reserved: 2020-08-13T00:00:00
Link: CVE-2020-19861

No data.

Status : Modified
Published: 2022-01-21T15:15:07.607
Modified: 2024-11-21T05:09:26.213
Link: CVE-2020-19861


No data.