First published: Fri Jan 21 2022(Updated: )
When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow information leakage.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nlnetlabs Ldns | =1.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-19861 is a vulnerability in ldns 1.7.1 that can cause heap overflow information leakage.
This vulnerability occurs when a zone file in ldns 1.7.1 is parsed, and the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file.
The severity of CVE-2020-19861 is high with a severity score of 7.5.
To fix CVE-2020-19861, you should update ldns to a version that is not affected by this vulnerability.
You can find more information about CVE-2020-19861 at the following references: [CWE-125](https://cwe.mitre.org/data/definitions/126.html) and [ldns GitHub issue #51](https://github.com/NLnetLabs/ldns/issues/51).